fff, 0xd3e1, 0xffffffffffffffff, 0x2, 0xfffffffffffffff8, 0x9, 0x8, 0xeb1, 0x6, 0x1, 0x3, 0x0, 0x10, 0x80, 0x7, 0x5, 0x2, 0x5, 0x6, 0x7, 0x6c, 0x2, 0x550b, 0x22ff, 0x3, 0x5c, 0x8, 0x6, 0x9, 0x38, 0x5, 0x100000000, 0x959, 0x3f, 0x1d0f9596, 0xfffffffffffffff8, 0xeb9, 0x2, 0x81, 0x2, 0x100, 0x0, 0x2, 0x5, 0x1f, 0x80000001, 0x9, 0x4, 0x8, 0xffffffffffffff01, 0x10001, 0xd8b, 0x5, 0x800, 0x7153, 0x1, 0x0, 0x10000, 0x6abb, 0x401, 0xffffffff, 0x6, 0x4, 0x7, 0x1, 0x6, 0x4000000, 0x8, 0x1000, 0x8, 0x9, 0x8, 0x9, 0x3, 0x1f, 0x6, 0x6, 0xd9cd, 0x9, 0x72, 0x7, 0x2, 0x40, 0x1000, 0x0, 0x3, 0xfffffffffffffff9, 0xdc, 0x5, 0x2800, 0x6, 0x480000000000000, 0x6c, 0x8, 0x12, 0x6, 0x9, 0x5, 0x126c, 0x6321, 0x5, 0x3, 0x80000000, 0x9f6, 0x0, 0x1, 0x6c438c33, 0x6, 0x6d253aa0, 0x40, 0x7, 0x19, 0x30bc, 0x55dbfaea, 0x8001, 0x3, 0xe6c, 0x5e0, 0x100000001, 0x3, 0xc4f, 0x2, 0x8001, 0x7, 0x100, 0x3, 0xfe4, 0x9, 0x6, 0x1000, 0x7, 0x5, 0x5, 0x8c, 0x4, 0x81, 0x40, 0x81, 0x1, 0x7, 0x8, 0x6, 0x3, 0xa6b, 0x2, 0x10000, 0xfffffffffffffffd, 0x2, 0x81, 0x401, 0x3, 0x3, 0x4, 0x3, 0x5, 0x3ff, 0x100000001, 0x1c, 0x6, 0x20, 0x5, 0x2000000000000, 0x400, 0x33, 0x1ff, 0x2a4, 0x4, 0x4, 0x0, 0x4, 0xff, 0x7fff, 0x1ff, 0xcd7, 0x1, 0xfffffffffffffffe, 0x1, 0x1, 0x7577, 0x100000001, 0x9d0, 0x0, 0x3, 0xfffffffffffffffe, 0x2, 0x80, 0x6, 0x3, 0x100, 0x3, 0x8]}, @TCA_HTB_PARMS={0x30, 0x1, {{0x0, 0x0, 0x7, 0x3, 0x64, 0x10000}, {0x7, 0x2, 0x6, 0x5, 0x3, 0x2}, 0x6, 0x2, 0x2, 0x0, 0x5}}]}}, @TCA_RATE={0x8, 0x5, {0x4c7, 0xbe2}}, @TCA_RATE={0x8, 0x5, {0x5, 0xbb5}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x408, 0x2, [@TCA_HTB_RTAB={0x404, 0x4, [0x7fffffff, 0x200, 0x7fff, 0x3, 0x7fff, 0x400, 0x10001, 0x3, 0x6, 0x3, 0x100000001, 0x6a, 0x7f, 0x0, 0xbb2, 0x3f, 0x1, 0x100, 0x68, 0xffffffffffffa70c, 0x1ff, 0x9, 0x10000, 0x2, 0x800, 0x9, 0x4, 0x2, 0x6, 0xfc8, 0x11, 0x0, 0x7, 0x56, 0x9, 0x3ff, 0x7, 0x4, 0x1000, 0x9, 0x0, 0xfff, 0x10000, 0x3, 0x765, 0x5, 0x9, 0x4, 0xfffffffffffffff9, 0x7, 0x6, 0xffffffffffffffc0, 0x4, 0x7f, 0x8, 0x100000000, 0x5, 0xffffffffffff8000, 0x6, 0x3b72, 0x2, 0x6, 0x2, 0x3, 0x7f, 0x34f, 0x0, 0x2, 0x8, 0x40000000000000, 0x0, 0x453b, 0xafd6, 0x7fffffff, 0x200, 0x7, 0x7ff, 0xffff, 0xffffffffffff0000, 0x7, 0x3ff, 0x9, 0x5, 0x9, 0xbf, 0x7, 0x1, 0x40, 0xfff, 0x40, 0x5, 0x2, 0xfffffffffffffff8, 0x6, 0x80, 0xbf00000000000000, 0x7, 0x0, 0x2, 0x20, 0x4, 0x7, 0x1000, 0xfffffffffffff001, 0x10000, 0x5, 0x81, 0x1, 0x1, 0x7f5f, 0x5, 0x9, 0x8, 0x18000000, 0x8001, 0x3ff, 0xff, 0x89, 0x6, 0x800, 0x7f, 0x9, 0x1, 0x7, 0x8000, 0x6, 0x1, 0x8, 0x0, 0x7, 0x7, 0x3f, 0x8001, 0x3, 0x57, 0x0, 0x1, 0x5, 0x9a3, 0x2a0935ed, 0x100000001, 0x9, 0xfffffffffffffffe, 0x720d, 0x2, 0xffffffffffff0001, 0x9, 0x7, 0xd6f, 0x6, 0x10000000000000, 0x1f, 0x0, 0x7, 0x80, 0x72, 0x3, 0x6, 0x2, 0x6, 0x5, 0x6, 0x636, 0x3ff, 0x5, 0x0, 0x0, 0x6, 0x2, 0x8, 0x1000, 0x200, 0xfffffffeffffffff, 0x3, 0xffff, 0xe, 0xe2, 0x9, 0x5, 0xe19, 0x3b, 0x5, 0xd84, 0x8, 0x1f31, 0x9, 0x8001, 0x4, 0x6, 0xce, 0x8, 0x3f, 0x37, 0x80000001, 0x74, 0xe2d, 0x9, 0x10000, 0x1, 0x8, 0x80000000, 0x9, 0x1, 0x8, 0x4, 0x4, 0x1, 0xffffffffffffff01, 0x7, 0xa9, 0x8, 0x7, 0x80000000, 0xfa0, 0x100000000, 0x9, 0x1, 0x3, 0x20, 0x0, 0x8, 0x2, 0xa6, 0x0, 0x7e2, 0x7, 0x3f, 0x10000, 0x100000001, 0x8, 0xf72, 0x3, 0x6, 0x80, 0xffff, 0x10001, 0x9, 0x3, 0x3, 0x8000, 0x1, 0x0, 0x6, 0x445, 0x9, 0x2, 0x3, 0x3ff, 0x5, 0x80, 0x1, 0x38000000000, 0x92, 0x2, 0x7ff, 0x8000]}]}}, @TCA_RATE={0x8, 0x5, {0x8, 0x8000}}]}, 0x109c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 23:41:20 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @default, @netrom={'nr', 0x0}, 0x0, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x0, 0xa, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default]}) [ 424.721325] device bridge_slave_1 left promiscuous mode [ 424.727028] bridge0: port 2(bridge_slave_1) entered disabled state 23:41:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x800, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000007c0)={0x0, @in6={{0xa, 0x4e23, 0xbc64, @rand_addr="db41fc8c5d3f63d2a402325d2407af2f"}}, 0x4, 0x7fffffff}, &(0x7f0000000280)=0x88) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000540)={r3, 0x2}, &(0x7f00000006c0)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e23aaef0cd38919) dup(r1) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r4 = getpgrp(0x0) setpriority(0x0, r4, 0xffff) semget$private(0x0, 0x1, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000005c0)={0x57, 0x0}) r5 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') shmget$private(0x0, 0xc000, 0x800, &(0x7f0000ff3000/0xc000)=nil) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x400000, 0x0) execve(&(0x7f0000000440)='./file0\x00', &(0x7f0000000680)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000640)='proc\x00', &(0x7f0000000740)='!\x00']) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x161}, 0x0) [ 424.790976] device bridge_slave_0 left promiscuous mode [ 424.797757] bridge0: port 1(bridge_slave_0) entered disabled state 23:41:20 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000000)={0x3, "9bccd085832a94dd457e0fe28ae022430432750e41a00cf64f3f946deb9a74aa"}) 23:41:20 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300), 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 424.880137] protocol 88fb is buggy, dev hsr_slave_0 [ 424.885281] protocol 88fb is buggy, dev hsr_slave_1 [ 425.102210] device hsr_slave_1 left promiscuous mode [ 425.144239] device hsr_slave_0 left promiscuous mode [ 425.205667] team0 (unregistering): Port device team_slave_1 removed [ 425.287459] team0 (unregistering): Port device team_slave_0 removed [ 425.348784] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 425.422720] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 425.507398] bond0 (unregistering): Released all slaves [ 427.180886] IPVS: ftp: loaded support on port[0] = 21 [ 428.041339] chnl_net:caif_netlink_parms(): no params data found [ 428.078222] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.085266] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.092539] device bridge_slave_0 entered promiscuous mode [ 428.099087] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.105586] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.112629] device bridge_slave_1 entered promiscuous mode [ 428.131305] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 428.139968] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 428.158957] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 428.166431] team0: Port device team_slave_0 added [ 428.171863] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 428.178978] team0: Port device team_slave_1 added [ 428.184393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 428.191614] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 428.254065] device hsr_slave_0 entered promiscuous mode [ 428.290341] device hsr_slave_1 entered promiscuous mode [ 428.330554] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 428.337458] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 428.350453] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.356805] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.363528] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.369874] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.399146] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 428.405657] 8021q: adding VLAN 0 to HW filter on device bond0 [ 428.415222] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 428.424107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 428.431241] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.437818] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.447465] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 428.453847] 8021q: adding VLAN 0 to HW filter on device team0 [ 428.462236] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 428.470975] bridge0: port 1(bridge_slave_0) entered blocking state [ 428.477314] bridge0: port 1(bridge_slave_0) entered forwarding state [ 428.490574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 428.498167] bridge0: port 2(bridge_slave_1) entered blocking state [ 428.504571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 428.513870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 428.529955] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 428.539866] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 428.550237] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 428.556609] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 428.564419] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 428.572202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 428.579598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 428.587201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 428.598662] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 428.611733] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 429.030584] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:41:25 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300), 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:25 executing program 1: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x1000001ea, 0x0, 0x0) msgsnd(r0, &(0x7f0000000340)={0x1}, 0x8, 0x0) 23:41:25 executing program 5: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:41:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0xfffffffffffffffe, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:25 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = getpgid(0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x10000, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e21, 0x200, @loopback, 0x20}, 0x1c) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f00000004c0)={0x0, 0x8, 0x2, &(0x7f0000000480)=0xf4}) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x3f, 0x4, 0x4, 0x2, 0x0, 0x1, 0x2204c, 0xc, 0x3, 0xfff, 0x100, 0x3, 0x3ff, 0x20, 0x80000001, 0x5, 0x8000, 0xfffffffffffffff7, 0x9, 0x6, 0x0, 0x2, 0x3, 0x686, 0x5, 0x2, 0x9, 0x40, 0x5e4a83fc, 0x4, 0xe3c6, 0x1, 0x7fff, 0x10001, 0x10000, 0x4, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x6, 0x3, 0x9, 0x4480, 0x80000000, 0x3}, r2, 0x2, r0, 0x3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000400)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000440)=0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:25 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000380)="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") ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$usb(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x80, 0x600000) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000500)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000480)) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x40000) setxattr$trusted_overlay_opaque(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.opaque\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000600)='/dev/sg#\x00', 0x401, 0x2) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r4, 0x4010ae68, &(0x7f0000000340)={0x1002}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000300)=0x40, 0x8) 23:41:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:25 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x0, 0x800000000000009, 0x0, "665bf726c3000000800000000079fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2c19d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0x86) 23:41:25 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x40000000000026d, 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') preadv(r0, &(0x7f00000017c0), 0x1b8, 0xf0ffffff7f0000) 23:41:25 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) ptrace$getregs(0xe, r1, 0x3, &(0x7f0000000300)=""/68) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000380)={0x0, 0x3f, 0x9}, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000080)=[0x970c, 0x200000000000]) 23:41:25 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) sync_file_range(r1, 0xffffffff, 0x4, 0x6) [ 430.640629] protocol 88fb is buggy, dev hsr_slave_0 [ 430.646314] protocol 88fb is buggy, dev hsr_slave_1 23:41:26 executing program 5: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x5) 23:41:26 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000b7e000/0x3000)=nil, 0x3000, 0x1000006, 0x5c831, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000023c0)={{{@in6=@initdev, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000002880)) 23:41:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x7fe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000080)={0x3, 0x18, 0x1, 0x400}) 23:41:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x420800, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) 23:41:26 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 430.850591] device bridge_slave_1 left promiscuous mode [ 430.856377] bridge0: port 2(bridge_slave_1) entered disabled state 23:41:26 executing program 5: semop(0x0, &(0x7f0000000040)=[{}, {}], 0x2) semctl$GETZCNT(0x0, 0x1, 0xf, 0x0) [ 430.941269] device bridge_slave_0 left promiscuous mode [ 430.948162] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.120609] protocol 88fb is buggy, dev hsr_slave_0 [ 431.126163] protocol 88fb is buggy, dev hsr_slave_1 [ 431.330154] device hsr_slave_1 left promiscuous mode [ 431.383811] device hsr_slave_0 left promiscuous mode [ 431.444015] team0 (unregistering): Port device team_slave_1 removed [ 431.459640] team0 (unregistering): Port device team_slave_0 removed [ 431.472463] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 431.503490] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 431.577468] bond0 (unregistering): Released all slaves [ 433.271491] IPVS: ftp: loaded support on port[0] = 21 [ 434.137515] chnl_net:caif_netlink_parms(): no params data found [ 434.174844] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.181400] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.188260] device bridge_slave_0 entered promiscuous mode [ 434.195082] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.201553] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.208381] device bridge_slave_1 entered promiscuous mode [ 434.227035] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 434.236062] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 434.254092] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 434.261397] team0: Port device team_slave_0 added [ 434.266698] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 434.274023] team0: Port device team_slave_1 added [ 434.279980] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 434.287361] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 434.372276] device hsr_slave_0 entered promiscuous mode [ 434.430317] device hsr_slave_1 entered promiscuous mode [ 434.490520] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 434.497371] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 434.511936] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.518268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.524921] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.531321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.559811] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 434.566299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 434.574289] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 434.585458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 434.592523] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.599095] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.608705] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 434.614925] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.623235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 434.630993] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.637349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.647099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 434.654732] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.661119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.675137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 434.683019] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 434.695745] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 434.705866] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 434.716600] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 434.723393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 434.731757] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 434.739160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 434.747345] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 434.758564] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 434.771360] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 435.120601] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:41:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:31 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000080)={0xf, 0x0, 0x0, {0x7, 0x7fff, 0x5, 0x20}}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000300)=0x5, 0x4) flock(r1, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 23:41:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000880000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000e7ffffffffffffff0000000000000000000000000000000000000000000000d1a192938d25d0c000"/112], 0xb8}}, 0x0) 23:41:31 executing program 2: r0 = socket(0x2, 0x3, 0x7) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000000)={0x81, 0x8, 0x8000}, 0xc) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r2, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x7, 0x2}, 0x0, 0x0, &(0x7f0000000380)={0x4, 0x7, 0x7fffffff, 0x5}, &(0x7f00000003c0)=0x3f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x5}}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:31 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:31 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 23:41:31 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:31 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x83c, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000080)={0x3f, 0x19, 0xffff, 0x1000, "aa7726ee8e7ae9ba7cda3fcaed786a6443263e8a3c35aee9c80a8095f9498252"}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:31 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:31 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="11dc2961eed68777d09dfa") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioprio_get$pid(0x1, 0x0) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000380)={0x0, 0x2932, 0x7, &(0x7f0000000340)=0x800}) accept4$inet(r1, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000080)=0x10, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f00000003c0)=0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r3, &(0x7f0000000540)={0xb, 0x10, 0xfa00, {&(0x7f0000000400), r4, 0x3}}, 0x18) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:31 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, 0x0, 0x0) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:31 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:31 executing program 4: lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="757365722e75736572282ec82300a9e9d368736b9d257c9ebb56f0c137954d53896e4a639f76ff5ab03fa0601494406ced48a04ab333b38ea70fe3a3c0e5c8401f3a0ddc4e0e6cfd6288421a8b7a51bc47757bfcdcd1dd1138635ce7a1e7a822fe773e74de72f577a5dc31317e84be33"]) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000300)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9, 0x480) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000380)) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x0) ioctl$NBD_SET_FLAGS(r3, 0xab0a, 0x15) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "3655bf7626c7cfab", "8a412c736207020da084693fb9eaf51e", "99c7a2c3", "d904e3283da4e13f"}, 0x28) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:32 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200400, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080)={0xa, 0x4, 0x20, 0x5}, 0xa) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x545f, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={&(0x7f0000000300), 0xf}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000340)=""/81) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000003c0)) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000400)) 23:41:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000340)={0x9, 0xab, 0x9, &(0x7f0000000300)="b9172fc4eeaaac249e"}) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000480)=0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x6, 0x5, 0x80, 0x9, 0x0, 0x50, 0xa0000, 0x2, 0x3, 0x4, 0x7f, 0x63, 0x101, 0x8000, 0x1ff, 0xf52, 0x1, 0x101, 0x8000, 0x4, 0x8000, 0x0, 0x3, 0xff, 0x2, 0x0, 0x0, 0x2, 0x13cb, 0xcd, 0x4, 0x9b, 0x3, 0x100000000, 0x8000, 0x5, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000003c0), 0x8}, 0x20, 0x4, 0x3, 0x7, 0x9, 0x900000000, 0x10001}, r4, 0x6, r0, 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000000)=0xfc5) 23:41:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 23:41:32 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x800) [ 437.390195] protocol 88fb is buggy, dev hsr_slave_0 [ 437.395279] protocol 88fb is buggy, dev hsr_slave_1 [ 437.400956] protocol 88fb is buggy, dev hsr_slave_0 [ 437.406028] protocol 88fb is buggy, dev hsr_slave_1 [ 437.419395] protocol 88fb is buggy, dev hsr_slave_0 [ 437.424495] protocol 88fb is buggy, dev hsr_slave_1 23:41:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000080)={0x16, 0x98, 0xfa00, {0x0, 0x0, 0xffffffffffffffff, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @mcast1, 0x1ff}}}, 0xa0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000002480)={0x8, "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", 0xffffffffffffff64}, 0xfffffe52) openat$cgroup(r2, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r2, 0x0, 0x0, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x4e24, 0x4, @local, 0x4}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xffd5) 23:41:33 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') setsockopt$inet6_buf(r0, 0x29, 0xff, &(0x7f0000000080)="4f846e51d604b80315066d0bbf88ac81cea1673df441b664b224e995595c2fddc5662658846ff88d70b1d530df9b798bc5ee", 0x32) r1 = syz_open_dev$sndpcmc(&(0x7f0000000480)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f00000004c0)="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") ioctl(r2, 0x7fff, &(0x7f0000000300)="f64b917e71e43b09b41496f620a4dd82128a54d1b5c1faed7f0a86b424b88c0e6023e7a7dc2317c69939a211367339a3150d4dbd77ab7274f2295034aa9e4ad65f3443d16fc5b336760237b3a6720217604e2b83bc36346ecfd9b9f521f1e4a9bec9dff864024db7b089fa3240573a4e7d38228759079385153e09d009") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000380)={0x0, 0xbfd, 0x4, [0x5, 0xa74, 0x7, 0x9962]}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000400)={r4, 0xfa19, 0x1, [0x6]}, &(0x7f0000000440)=0xa) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:33 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, 0x0, 0x0) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 438.032281] device bridge_slave_1 left promiscuous mode [ 438.038021] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.121557] device bridge_slave_0 left promiscuous mode [ 438.128337] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.482762] device hsr_slave_1 left promiscuous mode [ 438.524470] device hsr_slave_0 left promiscuous mode [ 438.564608] team0 (unregistering): Port device team_slave_1 removed [ 438.606832] team0 (unregistering): Port device team_slave_0 removed [ 438.648866] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 438.717566] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 438.881727] bond0 (unregistering): Released all slaves [ 440.941525] IPVS: ftp: loaded support on port[0] = 21 [ 441.992484] IPVS: ftp: loaded support on port[0] = 21 [ 442.024755] chnl_net:caif_netlink_parms(): no params data found [ 442.094197] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.100729] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.107559] device bridge_slave_0 entered promiscuous mode [ 442.114836] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.121251] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.128366] device bridge_slave_1 entered promiscuous mode [ 442.191055] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 442.221686] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 442.252341] chnl_net:caif_netlink_parms(): no params data found [ 442.279763] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 442.287162] team0: Port device team_slave_0 added [ 442.299733] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 442.307207] team0: Port device team_slave_1 added [ 442.313363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 442.334271] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 442.344978] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.352300] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.359146] device bridge_slave_0 entered promiscuous mode [ 442.366254] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.372674] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.379825] device bridge_slave_1 entered promiscuous mode [ 442.462684] device hsr_slave_0 entered promiscuous mode [ 442.510342] device hsr_slave_1 entered promiscuous mode [ 442.551679] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 442.564151] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 442.572252] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 442.589440] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 442.604542] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 442.612468] team0: Port device team_slave_0 added [ 442.618199] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 442.625760] team0: Port device team_slave_1 added [ 442.631121] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 442.644806] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 442.702382] device hsr_slave_0 entered promiscuous mode [ 442.740450] device hsr_slave_1 entered promiscuous mode [ 442.792505] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 442.806483] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 442.815624] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.822010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.828587] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.834977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.854565] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.860963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 442.867595] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.873981] bridge0: port 1(bridge_slave_0) entered forwarding state [ 442.928577] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 442.934955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 442.945356] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 442.955858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 442.962975] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.969550] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.977182] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.983850] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.992898] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 443.003069] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 443.009601] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.017449] IPVS: stopping backup sync thread 11526 ... [ 443.019967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 443.030339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 443.038321] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.046790] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.053192] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.062547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.069872] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 443.077931] device bridge_slave_1 left promiscuous mode [ 443.084232] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.130768] device bridge_slave_0 left promiscuous mode [ 443.136213] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.311621] device hsr_slave_1 left promiscuous mode [ 443.352603] device hsr_slave_0 left promiscuous mode [ 443.392900] team0 (unregistering): Port device team_slave_1 removed [ 443.404731] team0 (unregistering): Port device team_slave_0 removed [ 443.414352] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 443.453489] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 443.536254] bond0 (unregistering): Released all slaves [ 443.566083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 443.574898] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.584889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.592549] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.598889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.608902] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 443.616283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.625581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.635203] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 443.642424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 443.651834] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 443.657903] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.667879] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 443.676341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 443.683690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 443.691865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.699392] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.705769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.712902] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 443.723842] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 443.735585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.743398] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.751110] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.757446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.769027] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 443.776945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 443.786832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 443.793761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 443.801742] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 443.809180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 443.816931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 443.824987] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 443.834631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 443.842925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 443.854563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 443.862467] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 443.871394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 443.879075] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 443.930253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 443.937991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 443.946894] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 443.954676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 443.964742] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 443.974091] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 443.982147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 443.989648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.997638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 444.009307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.025155] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 444.031595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 444.039549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 444.047388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 444.055416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.075644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 444.096078] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 444.105332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 444.117250] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.129060] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 444.138912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 444.152817] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 444.188296] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 444.208717] 8021q: adding VLAN 0 to HW filter on device batadv0 23:41:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) fcntl$setlease(r0, 0x400, 0x2) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:41 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, 0x0, 0x0) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, 0x0, 0x800) 23:41:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:41:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x100, 0x0) accept4$alg(r1, 0x0, 0x0, 0x80800) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000340)={0x4, @local, 0x4e23, 0x3, 'fo\x00', 0x1, 0x9, 0x65}, 0x2c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000300)={0x4, [0x8, 0xfffffffffffffffb, 0x6, 0x1ff]}, 0xc) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000080)={0x8, 0x0, 0x0, 0x4, 0x0, 0x1, 0x2, 0x1}) 23:41:41 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000300)="e3ded763020073635b4e9cbad9e96d8eddd4acf3f82a1f22257f37043fb5b6089917cb94110a6d34d303ce5cd42effed463bd7b767c1a06c49f1f555cb4419500b132ac3d97ee8e7a1bfec03228424e33ff318") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000400)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}, 0x0, 0x4, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a58fc0bd81f996a804e65c2e09d6f091839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7a6897dfa77629d800"}, 0xd8) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='highspeed\x00', 0xa) [ 445.620824] IPVS: set_ctl: invalid protocol: 4 172.20.20.170:20003 [ 445.684411] IPVS: set_ctl: invalid protocol: 4 172.20.20.170:20003 23:41:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:41:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000400)={0x5, 0x29bc, 0x7ff}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = semget$private(0x0, 0x0, 0xa4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000480)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000580)=0xe8) fstat(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000700)={{0x8, r4, r5, r6, r7, 0x10}, 0x84, 0x1ff, 0xee}) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r8 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x43b, 0x40) ioctl$SNDRV_TIMER_IOCTL_GINFO(r8, 0xc0f85403, &(0x7f0000000300)={{0xffffffffffffffff, 0x3, 0x1, 0x3, 0x4}, 0x7, 0x3, 'id0\x00', 'timer1\x00', 0x0, 0x3, 0x2, 0x8, 0x100000000}) 23:41:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x5, &(0x7f0000000300)={0x9}, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x90000, 0x0) ioctl$VFIO_CHECK_EXTENSION(r0, 0x3b65, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:41 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 446.420416] device bridge_slave_1 left promiscuous mode [ 446.425961] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.481007] device bridge_slave_0 left promiscuous mode [ 446.486593] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.652738] device hsr_slave_1 left promiscuous mode [ 446.694107] device hsr_slave_0 left promiscuous mode [ 446.754588] team0 (unregistering): Port device team_slave_1 removed [ 446.787474] team0 (unregistering): Port device team_slave_0 removed [ 446.808970] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 446.864446] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 446.996237] bond0 (unregistering): Released all slaves [ 448.781457] IPVS: ftp: loaded support on port[0] = 21 [ 449.631960] IPVS: ftp: loaded support on port[0] = 21 [ 449.641913] chnl_net:caif_netlink_parms(): no params data found [ 449.718408] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.725126] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.732592] device bridge_slave_0 entered promiscuous mode [ 449.742364] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.748759] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.755676] device bridge_slave_1 entered promiscuous mode [ 449.776411] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 449.785851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 449.807753] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 449.815715] team0: Port device team_slave_0 added [ 449.822308] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 449.829466] team0: Port device team_slave_1 added [ 449.837966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 449.845844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 449.934176] device hsr_slave_0 entered promiscuous mode [ 449.971162] device hsr_slave_1 entered promiscuous mode [ 450.028467] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 450.035529] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 450.049746] chnl_net:caif_netlink_parms(): no params data found [ 450.076798] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.083178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.089743] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.096124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.137586] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.146002] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.152904] device bridge_slave_0 entered promiscuous mode [ 450.164421] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.170940] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.177775] device bridge_slave_1 entered promiscuous mode [ 450.199795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 450.209265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 450.231738] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 450.238927] team0: Port device team_slave_0 added [ 450.245678] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 450.254094] team0: Port device team_slave_1 added [ 450.259755] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 450.267167] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 450.332336] device hsr_slave_0 entered promiscuous mode [ 450.390304] device hsr_slave_1 entered promiscuous mode [ 450.440791] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 450.447683] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 450.465198] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 450.471320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 450.480875] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 450.491812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.498941] bridge0: port 1(bridge_slave_0) entered disabled state [ 450.506213] bridge0: port 2(bridge_slave_1) entered disabled state [ 450.516091] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 450.528912] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 450.535121] 8021q: adding VLAN 0 to HW filter on device team0 [ 450.546592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.554447] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.560851] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.581028] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.589948] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.596351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.604560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.612651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.621005] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 450.628578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.647384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 450.655566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 450.665321] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.674795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 450.683115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 450.690765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.699800] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 450.706046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 450.723461] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 450.735725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 450.745919] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 450.755727] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 450.764920] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 450.771672] 8021q: adding VLAN 0 to HW filter on device team0 [ 450.778993] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 450.790291] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.798596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.809952] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 450.817566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.826456] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.835794] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.842203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.850171] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.858963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 450.871482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.879289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.887050] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.893441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.903713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 450.912610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 450.923178] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 450.930132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 450.939715] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 450.946693] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 450.954658] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.964827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.977260] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 450.984574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 450.993101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 451.004511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 451.011914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 451.019387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 451.029927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 451.038477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 451.046661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 451.056538] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 451.065900] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 451.088985] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 451.104689] 8021q: adding VLAN 0 to HW filter on device batadv0 23:41:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:46 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x200000000000, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f00000017c0)={0x1, 0x8, 0x1000, 0x1000, &(0x7f00000007c0)="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", 0xbc, 0x0, &(0x7f00000006c0)="a5d665e6b43676b085924d7b829265c8ba61bf2b32a4d2ab394aa01f590cb95bc48ee357bc29354c7d623bf6aaa0fed9e8cbe724491da91500a3eacefe3a79a585ad57d3af31f3aa5929a1f49fc39970ba16f655fc4fc3b85efe470f77c01389a818af45dc52268f7dc647fc5033bbadbc9546fd8615ac2eba01a757fd33d5a96b1c4003eb2c7e9a54b6686802d5cdb790de39a7d4798885a80c1c0f4fb577481a676cd62dd326e4332d9f4092cabbf86eb65823f95a1ad7f665b5af"}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() r7 = getegid() r8 = syz_open_dev$media(&(0x7f0000000640)='/dev/media#\x00', 0xfffffffffffffffd, 0x111000) setsockopt$ALG_SET_AEAD_AUTHSIZE(r8, 0x117, 0x5, 0x0, 0xbd) setgroups(0x7, &(0x7f0000000600)=[r1, r2, r3, r4, r5, r6, r7]) ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000000540)=0x0) sched_rr_get_interval(r9, &(0x7f0000000680)) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$KVM_HYPERV_EVENTFD(r8, 0x4018aebd, &(0x7f0000001840)={0x3, r8, 0x1}) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r11, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000000)="6fc20481a07466bd02ea508b366a015f4b87b9af2d7b9b7bc7a50295b59f6968ee6c45557563", 0x26, r0}, 0x68) setsockopt$inet6_tcp_TCP_MD5SIG(r11, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) getpeername(r1, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000000)=0x80) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 23:41:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:46 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:46 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/btrfs-control\x00', 0x80, 0x0) accept4$tipc(r0, &(0x7f0000000340)=@id, &(0x7f0000000380)=0x10, 0x800) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000003c0)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000ba000000fc6b435cf585e841ba444addb334a3d727a99da4d665368595facccd3131d49478e38bdc9af805c70d014abaddafbbeeb7f862b24cd6bd2397d481aeec88ef845b644ddebd5375ac109bae95ef0aec4f711ed24f4fe82b81eec61551f87d6860b88a858a26bb5b2154f5e70abdcbe715e889cfe53f8ef756be7bb8a3185961ed27921bd2cf61070c3d068550c5e9379386d6a83f9385bdb383996c5553ac025019d3090ba5f6868d059618840a1409d500"/222], &(0x7f00000004c0)=0xde) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$namespace(r3, &(0x7f0000000080)='ns/uts\x00') ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 451.420139] protocol 88fb is buggy, dev hsr_slave_0 [ 451.425257] protocol 88fb is buggy, dev hsr_slave_1 23:41:47 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:41:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = open(&(0x7f0000000000)='./file0\x00', 0x14000, 0x1a4) ioctl$RTC_UIE_ON(r2, 0x7003) 23:41:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x90000, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000080)='syz1\x00') setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0xac, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x96e7}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x612468b9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff0001}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x40800}, 0x0) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) 23:41:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:47 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 452.111121] device bridge_slave_1 left promiscuous mode [ 452.116660] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.191845] device bridge_slave_0 left promiscuous mode [ 452.205570] bridge0: port 1(bridge_slave_0) entered disabled state 23:41:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 452.400157] protocol 88fb is buggy, dev hsr_slave_0 [ 452.405312] protocol 88fb is buggy, dev hsr_slave_1 23:41:48 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(0x0, 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 452.562550] device hsr_slave_1 left promiscuous mode 23:41:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 452.616435] device hsr_slave_0 left promiscuous mode [ 452.665337] team0 (unregistering): Port device team_slave_1 removed [ 452.696231] team0 (unregistering): Port device team_slave_0 removed [ 452.750977] bond0 (unregistering): Releasing backup interface bond_slave_1 23:41:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 452.838207] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 452.880556] protocol 88fb is buggy, dev hsr_slave_0 [ 452.886172] protocol 88fb is buggy, dev hsr_slave_1 23:41:48 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(0x0, 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 453.087037] bond0 (unregistering): Released all slaves 23:41:48 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000300)={{0x2, 0x4e22, @multicast2}, {0x306, @dev={[], 0x23}}, 0x20, {0x2, 0x4e24, @loopback}, 'ip6_vti0\x00'}) [ 455.081501] IPVS: ftp: loaded support on port[0] = 21 [ 455.973910] chnl_net:caif_netlink_parms(): no params data found [ 456.020404] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.026885] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.037359] device bridge_slave_0 entered promiscuous mode [ 456.044541] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.051056] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.057900] device bridge_slave_1 entered promiscuous mode [ 456.082834] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 456.092763] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 456.115199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 456.122481] team0: Port device team_slave_0 added [ 456.127805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 456.135184] team0: Port device team_slave_1 added [ 456.140590] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 456.147872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 456.222454] device hsr_slave_0 entered promiscuous mode [ 456.280305] device hsr_slave_1 entered promiscuous mode [ 456.320589] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 456.330255] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 456.342596] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.348929] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.355587] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.361952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.397763] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 456.403866] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.412738] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 456.421765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 456.428844] bridge0: port 1(bridge_slave_0) entered disabled state [ 456.436103] bridge0: port 2(bridge_slave_1) entered disabled state [ 456.448520] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 456.454816] 8021q: adding VLAN 0 to HW filter on device team0 [ 456.463703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 456.471625] bridge0: port 1(bridge_slave_0) entered blocking state [ 456.477954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 456.495769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 456.504178] bridge0: port 2(bridge_slave_1) entered blocking state [ 456.510571] bridge0: port 2(bridge_slave_1) entered forwarding state [ 456.521024] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 456.528656] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 456.544883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 456.553035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 456.563410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 456.572885] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 456.578902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 456.595884] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 456.605631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 456.670754] device bridge_slave_1 left promiscuous mode [ 456.676222] bridge0: port 2(bridge_slave_1) entered disabled state 23:41:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:52 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) pipe2(&(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000016c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000001580)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)={0x4c, r2, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}]}, 0x4c}, 0x1, 0x0, 0x0, 0xe30c7e3a2aa49000}, 0x1) ptrace$getregset(0x4204, r0, 0x4002, &(0x7f00000015c0)={&(0x7f0000000300)=""/4096, 0xfe56}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$NBD_DISCONNECT(r5, 0xab08) r6 = syz_open_dev$amidi(&(0x7f0000001300)='/dev/amidi#\x00', 0x8, 0x1fffc) getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000080)=0x5, &(0x7f0000001600)=0x4) getsockopt$ax25_int(r6, 0x101, 0x7, &(0x7f0000001340), &(0x7f0000001380)=0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$TIOCLINUX7(r5, 0x541c, &(0x7f0000001640)={0x7, 0xee}) [ 456.721070] device bridge_slave_0 left promiscuous mode [ 456.726594] bridge0: port 1(bridge_slave_0) entered disabled state 23:41:52 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x90) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000080)={0x3, "1a59e9"}, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e22, @empty}}, 0x0, 0xffffffffffffffff, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) fcntl$getown(r2, 0x9) 23:41:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:52 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(0x0, 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 457.046010] device hsr_slave_1 left promiscuous mode 23:41:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 457.116320] device hsr_slave_0 left promiscuous mode [ 457.178843] team0 (unregistering): Port device team_slave_1 removed 23:41:52 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 457.230193] team0 (unregistering): Port device team_slave_0 removed 23:41:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 457.304299] bond0 (unregistering): Releasing backup interface bond_slave_1 23:41:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 457.397965] bond0 (unregistering): Releasing backup interface bond_slave_0 23:41:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:53 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 457.703239] bond0 (unregistering): Released all slaves 23:41:53 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/btrfs-control\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000740)=0x3, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 457.818520] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:41:53 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 459.701424] IPVS: ftp: loaded support on port[0] = 21 [ 460.505172] chnl_net:caif_netlink_parms(): no params data found [ 460.542423] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.548808] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.556259] device bridge_slave_0 entered promiscuous mode [ 460.563132] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.569496] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.576599] device bridge_slave_1 entered promiscuous mode [ 460.594340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 460.603298] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 460.621160] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 460.628245] team0: Port device team_slave_0 added [ 460.633706] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 460.640826] team0: Port device team_slave_1 added [ 460.645962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 460.653652] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 460.714210] device hsr_slave_0 entered promiscuous mode [ 460.770455] device hsr_slave_1 entered promiscuous mode [ 460.820497] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 460.827347] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 460.842285] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.848611] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.855258] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.861655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.891374] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 460.897450] 8021q: adding VLAN 0 to HW filter on device bond0 [ 460.905904] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 460.915807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 460.923792] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.930847] bridge0: port 2(bridge_slave_1) entered disabled state [ 460.941388] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 460.947469] 8021q: adding VLAN 0 to HW filter on device team0 [ 460.956623] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 460.964619] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.971023] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.980308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 460.987874] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.994260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 461.012126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 461.019748] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 461.027421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 461.035578] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 461.046388] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 461.057038] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 461.063416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 461.070773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 461.084226] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 461.095995] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 461.490443] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:41:57 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000480)=""/242) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x24001) r3 = getegid() stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() setgroups(0x4, &(0x7f0000000700)=[r3, r4, r5, r6]) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x5}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000340)={r7, 0x341c, 0x100}, &(0x7f0000000380)=0x8) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x9) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) inotify_init() write$P9_RMKNOD(r1, &(0x7f0000000580)={0x14, 0x13, 0x2, {0x1, 0x4, 0x1}}, 0x14) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) fdatasync(r1) setsockopt$inet6_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) utimensat(r2, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{0x77359400}}, 0x100) 23:41:57 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:57 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:57 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r3 = dup3(r0, r2, 0x80000) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000)=0x401, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:57 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e21, 0x7, @rand_addr="62d79de8d0b9522594f27b7b9beed267", 0xffff}}, 0x7, 0x80000000, 0x8, 0x9, 0x72d}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={r1, 0xe62}, 0x8) perf_event_open(&(0x7f00000000c0)={0x1, 0xffffffffffffffe6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13b, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:57 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:58 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ftruncate(r0, 0x85) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000480)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e22, 0x200, @local, 0xe9}}, 0x1, 0xd2, 0x1, 0x1, 0x548d}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000003c0)={r5, 0xa9}, 0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000400)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) 23:41:58 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:58 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) syz_open_procfs(r0, &(0x7f0000000200)='net/raw\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xfffffffffffffef4) 23:41:58 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000500)="1ddd959326e35e962f3da2bfbc900536d8f65448f6801e15e10a067e4a35889eb8e5e6b557420acb7a11ff158dedd1aa8a3eed1bfc3ffff4aee264be00982a1080a2af03ccb3514ff9ee26ace13882b08fd6a8b7eebb3f9bec91c142ba136885db75df6f5e63d76eea090921c8cefd4f8ac37ded3ce543cb6fe126239677ad940d7fd3567ccad807bf46c9adda4a9f78eed014462f4ca3cb081d2f7fd2cb87f30c244d1b1836389171d9c1532397137767f8d0a86f9a775c508022342169943443804d451fe18c449cd1d75610d4d85bf96b38e29f196355ce960000000000000000000000000000e2b2127b4bcde5310426b4801bce5253bdff03ed38cce656327eaec6a42d7da9da38e230d5f82dcf628bdfc39b6d6f30105dd4a3ae7455c6e8391615eda96b3ea6028d99b40e5cf9a62ca9a1db2b1e01923e5cbd219474fd82b8a4cbb34d37b253c3b516f39f6b3a0e49f01708e6c9d851f16d592f9e") perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x85}}, 0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed1a055edd05610db8ffb464f1417af72c5677bdc07000000000000008071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) 23:41:58 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:41:58 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x10000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000480)={@remote, @multicast2, 0x0}, &(0x7f00000004c0)=0xc) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000500)={r2, 0x1, 0x6, @broadcast}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:58 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:58 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/raw6\x00') ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000380)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='maps\x00') r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x406200, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000300)={0x1, r2, 0x1}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) socket$alg(0x26, 0x5, 0x0) 23:41:58 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000000)="1e915239635db9ae58df93fe7e6dfea36fd49f9caace3256a9cc3e14e993a0f68d61a91bcb5f964125", 0x29) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:58 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:41:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:41:58 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x2, 0x0, "6665f726c3b481c9470000000000000000a761cb8f2e3d037d3ef5f158fc0bd81f996a804e65c2dd9d232a9ae7f10b9f75f57c5673801abf45add2c304d0005772b6a5272847867629d800"}, 0xd8) r2 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000080)) [ 463.280590] protocol 88fb is buggy, dev hsr_slave_0 [ 463.286502] protocol 88fb is buggy, dev hsr_slave_1 [ 463.292155] protocol 88fb is buggy, dev hsr_slave_0 [ 463.297571] protocol 88fb is buggy, dev hsr_slave_1 23:41:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 463.355374] device bridge_slave_1 left promiscuous mode [ 463.364474] bridge0: port 2(bridge_slave_1) entered disabled state 23:41:58 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:41:59 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:41:59 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000300)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x0, 0x80000000, 0x5, 0x94d}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000400)={0x7, &(0x7f00000003c0)=[{0x6, 0x4a7, 0x2, 0x200}, {0x3, 0x6, 0x401, 0xfffffffffffffff4}, {0x9, 0x100, 0xfffffffffffffffa, 0x34}, {0x6, 0x0, 0x0, 0xc99b}, {0x20, 0x5, 0x3, 0x3}, {0x194700, 0x3, 0x0, 0x80}, {0x400, 0x7ff, 0x7, 0x3}]}, 0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000440)={@in={{0x2, 0x4e24, @multicast1}}, 0x0, 0x0, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81e996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:41:59 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7ff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1\x00'}) recvmsg$kcm(r2, &(0x7f0000001b80)={&(0x7f00000006c0)=@hci, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000740)=""/161, 0xa1}, {&(0x7f0000000800)=""/142, 0x8e}, {&(0x7f00000008c0)=""/70, 0x46}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/137, 0x89}], 0x5, &(0x7f0000001a80)=""/232, 0xe8}, 0x20) getsockname$packet(r2, &(0x7f0000001c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001c40)=0x14) getsockname$packet(r2, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001d00)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0xf0ae1fc95f5e5807, &(0x7f0000001d40)={@local, @loopback}, &(0x7f0000001d80)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001dc0)={'vcan0\x00'}) getsockname$packet(r2, &(0x7f00000023c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002400)=0x14) accept4(r1, &(0x7f00000024c0)=@can, &(0x7f0000002540)=0x80, 0x80000) getsockname$packet(r2, &(0x7f00000025c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002600)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002580)={'vcan0\x00', r3}) bind$packet(r2, &(0x7f000000bec0)={0x11, 0xf7, r4, 0x1, 0x8000, 0x6, @remote}, 0x14) [ 463.455859] device bridge_slave_0 left promiscuous mode [ 463.467686] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.763963] device hsr_slave_1 left promiscuous mode [ 463.845772] device hsr_slave_0 left promiscuous mode [ 463.874484] team0 (unregistering): Port device team_slave_1 removed [ 463.896162] team0 (unregistering): Port device team_slave_0 removed [ 463.923440] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 463.975059] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 464.116089] bond0 (unregistering): Released all slaves [ 465.841665] IPVS: ftp: loaded support on port[0] = 21 [ 466.657772] chnl_net:caif_netlink_parms(): no params data found [ 466.694732] bridge0: port 1(bridge_slave_0) entered blocking state [ 466.701263] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.708105] device bridge_slave_0 entered promiscuous mode [ 466.715404] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.721952] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.728773] device bridge_slave_1 entered promiscuous mode [ 466.746828] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 466.756097] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 466.775083] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 466.782388] team0: Port device team_slave_0 added [ 466.787827] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 466.795189] team0: Port device team_slave_1 added [ 466.801661] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 466.808833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 466.874031] device hsr_slave_0 entered promiscuous mode [ 466.910448] device hsr_slave_1 entered promiscuous mode [ 466.970674] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 466.977516] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 466.990603] bridge0: port 2(bridge_slave_1) entered blocking state [ 466.996964] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.003617] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.009959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.039355] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 467.047803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 467.056874] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 467.065499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 467.072744] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.079388] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.090368] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 467.096440] 8021q: adding VLAN 0 to HW filter on device team0 [ 467.105098] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 467.112788] bridge0: port 1(bridge_slave_0) entered blocking state [ 467.119137] bridge0: port 1(bridge_slave_0) entered forwarding state [ 467.128390] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 467.136235] bridge0: port 2(bridge_slave_1) entered blocking state [ 467.142618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 467.156087] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 467.164887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 467.174050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 467.185683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 467.194821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 467.207678] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 467.213868] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 467.237838] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 467.247646] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 467.641079] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:42:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x404000) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e22, @rand_addr=0x9}}, 0x0, 0xb6, 0x0, "e861d454e2951ac8268c45201527a6b5312e223475e13fff2cc8b98b1ddd5d365c3b9b34fe12636052f2af63931a56d0ad69a69e2b234d299af97e83dc6cacaef3e971063a21146731af3522b2b58b04"}, 0xd8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf32(r2, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x101, 0xfffffffffffffffb, 0x99a, 0x8, 0x6, 0x3, 0x3e, 0x200, 0x15b, 0x38, 0x4c, 0x0, 0x5, 0x20, 0x1, 0x2, 0xfffffffffffffffa}, [{0x70000000, 0xde, 0x5, 0x1, 0xfff, 0x7, 0x8, 0x8000}, {0x70000001, 0x0, 0x9, 0x3, 0x62c, 0x6, 0xffffffffffffff9a, 0x5}], "d41115b77f10e6644c492f6c36ae07bef48cdfe5a0ce39c26764c135b7bda053cecadee8cdea53638ec71ec51882bf174c5a7775b2a23605bc16f27746450b5c87c7e67a6cea9ca970324dd61b179a061408c6bf17090acfca27e6eb88f61dbfc16463de948c10de6d132c3dca2b768c067ba5199a33fe6dd22980efae48f3e503c85c1898595daa3ee6dc7c0f32d4afd51ca769e9e42af4598a6e96fe43b51065c50c342facdc38eb126493ebfdfb526aef441406bddb10ccb73011b90beb93e824411cf885db0d1abe524ac86c76ba027bd513bbad2dc054aca81eff913eed405949", [[], [], [], [], [], [], [], []]}, 0x95b) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x8, 0x10}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000340)={r3, 0x7f, 0x8, 0x0, 0x3, 0x80b}, 0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:42:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket(0x11, 0x1, 0x5) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1f, 0x4000) clock_gettime(0x0, &(0x7f00000060c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000005fc0)=[{{&(0x7f0000000140)=@ethernet, 0x80, &(0x7f0000002940)=[{&(0x7f0000000400)=""/158, 0x9e}, {&(0x7f00000004c0)=""/129, 0x81}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/164, 0xa4}, {&(0x7f0000000080)=""/10, 0xa}, {&(0x7f0000001640)=""/238, 0xee}, {&(0x7f0000001740)=""/239, 0xef}, {&(0x7f0000001840)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/54, 0x36}, {&(0x7f0000002840)=""/207, 0xcf}], 0xa, &(0x7f0000002a00)=""/60, 0x3c}, 0xdceb}, {{0x0, 0x0, &(0x7f0000003bc0)=[{&(0x7f0000002a40)=""/168, 0xa8}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/65, 0x41}, {&(0x7f0000003b80)=""/20, 0x14}], 0x4, &(0x7f0000003c00)=""/233, 0xe9}, 0x7}, {{&(0x7f0000003d00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003d80)=""/1, 0x1}], 0x1}, 0x3f}, {{&(0x7f0000003e00)=@ipx, 0x80, &(0x7f0000005f40)=[{&(0x7f0000003e80)=""/29, 0x1d}, {&(0x7f0000003ec0)=""/4096, 0x1000}, {&(0x7f0000004ec0)=""/4096, 0x1000}, {&(0x7f0000005ec0)=""/52, 0x34}, {&(0x7f0000005f00)=""/9, 0x9}], 0x5}, 0x3}], 0x4, 0x2, &(0x7f0000006100)={r1, r2+30000000}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$VT_ACTIVATE(r0, 0x5606, 0x9) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c5640fc21772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d807177135100"}, 0xfffffffffffffd90) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:42:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x50000, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000080)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e20, @loopback}}, 0x0, 0x5, 0x0, "1c9f1bbf06c4b12a9bffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 469.040127] protocol 88fb is buggy, dev hsr_slave_0 [ 469.045295] protocol 88fb is buggy, dev hsr_slave_1 23:42:04 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_out(r1, 0x0, &(0x7f0000000300)) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10000, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000080)={0x7, 0x1b, 0x1}, 0x7) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syncfs(r0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x3f, 0x100000000, 0x80000001, 0x10, 0xffffffffffffffff, 0xffffffffffffd3ce, [], 0x0, 0xffffffffffffffff, 0x3, 0x4}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r2, 0x4) 23:42:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) 23:42:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001780)=0x14) fchmod(r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000017c0)={'team0\x00', 0x0}) sendmsg$inet6(r1, &(0x7f00000019c0)={&(0x7f0000000080)={0xa, 0x4e22, 0x5, @empty, 0x20}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000300)="0d250d6e257660b5f2c778b22184b1aec157e777dc8a3f5bbd6276e5b8c1e3fe92a8996cedf555783105374072990dd1d6f6e45a943574fd4ed64458e8b84440272c993e0c6ac7d20cf56925b2c612a3ac4c66c3b7fc976afa790d787c8699e332455e480cff5632566f06fecc8c4b05bba5ab78aa1671908433b42f22bad5dd66e5e9f2b3f5ac9f2115b07e999ce112fa2a269f62d3a38ade5c09cd8a9be79ac418c4c144c1b8de60a5af1432546f6de698ee7506b898285b47857c5be56fe1c41781ec7ed351c56c86919bdddb1beefad5c57bdf308a7a912bcf28df98a4", 0xdf}, {&(0x7f0000000400)="c5729ba2db0bbce15ecf94c4a1a38bbb63b6aa2b762c463fb0958b215c3eb3bf7ac5e690ce88d378a689a73ed0dc7ce4978d64edcdb75a25bd83120d4cc2011997025ceb39ff5ef0d93ae9543c383a95ace06ee147e5a615de6cf7d64d5901d7cd5a0c5802700b22c17eee07ac21316084f540eada001fbade049459b1564546a1f3b4fb4f742fed5ac72cd968dcef6eb50d87461e58100d54eeefb595cc77954c59f1c7db32318529732e1bf0903d396a", 0xb1}], 0x2, &(0x7f0000000500)=ANY=[@ANYBLOB="24000000000000002900000032000000fe8000000000000000000000000000bb", @ANYRES32=r2, @ANYBLOB="000000001400000000000000290000003e0000000400000000000000240000000ffffb00290000003200000020749de916c844cdd665e637d89963f212829087544c97a7ff831ad98a22df5ef999948ee47c5eec737fc275a17a62241a2daca5277a09454fc7231fb01d69ca61c095b39a9562e0aee860115e78fb37955626991756e6b550ac47e0aa3c0dda27c8e8f298c72f42b29f88fee1bb8297b600445eb66627a124a908c0b5aaf5684f84b7f49051b8cba30d68aca3f9954f29459eec24f427b9f1d1f53a99a1265f5a3ba723fdcbc328e5df1d0591", @ANYRES32=r3, @ANYBLOB="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"], 0x1c0}, 0x800) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:05 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:05 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(0x0) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) epoll_wait(r2, &(0x7f0000000080)=[{}, {}, {}], 0x3, 0x1) 23:42:05 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VT_RELDISP(r2, 0x5605) mq_unlink(&(0x7f0000000080)='/dev/swradio#\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000300)={0x0, @aes256, 0x3, "38ca72dc75ca06da"}) 23:42:05 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:05 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'caif0\x00', 0x80}) ioctl$KDSETLED(r0, 0x4b32, 0x10003) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000300)={0x0, 0x36e3, [0x2, 0x1, 0x3, 0x4, 0x5], 0x4}) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) accept4(r2, &(0x7f0000000340)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000003c0)=0x80, 0x80000) sendmmsg(r1, &(0x7f0000004580)=[{{&(0x7f0000000400)=@hci={0x1f, r3, 0x2}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)="1945a76584f8efa94982948ab6ef641fbe29738e4542e0115e5e7033768a5e15ddec6ecebdd41e8e308945404507eb6197665427473e5d393cb8b86f03b20f10e7a7245a20eb0df5ca4ad263816f7981dbb310fc8ad1c1d4c5472b3aad4d8d06ec641fb0d537250424e078e253fd6afea4faacc7", 0x74}, {&(0x7f0000000500)="99335edd381602af4b53f992b22c1424f7fb0f76b790f98ffa50c927dce79bf6fd664c9553a3a1de94601278e38b422d8b0091dbcb47eb3959016c03154e3fec1dba543f2e59932c2d09025f5750f6a4884a0c60fc63309986e4ccaef2efaa5a6a9bed025247a288", 0x68}], 0x2, &(0x7f00000005c0)=[{0x68, 0x10f, 0x100000000, "0b2c13f5b336f834de4bf6a9c5ac06965f2bf1454be0bb09b7bd63449267d80eadd48ce2e3e462290bf7350418137f4c6acf9b094e882fd8817d2050df54bfd572a009631fb5cc77909ba4b9403f81b7be00"}, {0x1010, 0xba, 0x4, "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"}, {0xb0, 0x3a, 0x0, "05ab51c599889aa3d1b5e7437af31f10a3a0e67cd5876d3ea4e4276cfc9164f1547272fc586855f4b9a2e120821fa52c0f74168e54ff30da3f095821225258e8588a8b58719098cf86a2409833ec1a390408e542a38af393b83bc064909d452ccc6023126bdcbb8be33bfba62dadd9de2877764c7edb2055cc32f71b5a6f29df55435662f94c13a51332b52d7b5a29d362a8bfeb6c2caa16a7b304"}, {0x60, 0x102, 0x7, "1e146a9b8e216bc574220ac5c3093ae8af884e9807802f4b96a0b977c5a54ecc4e2ef34b65c197aaaa0bba8e8c71f5299cf4b7489e43ecbca77dd90eda8cf4e5f78ca50235a297244049f626313c3fa9"}, {0x50, 0x11f, 0x94, "dff1aa4a8eb8fc8d786194becdbf2fcb869005f4c9c703459d223e3c0a7296ccb748dcefc77990aebaaa09515ae8806e817006ff3cc2c87f6c3802"}, {0x48, 0x10d, 0x8, "bd2824546b9d21809c889741b2d614661bfd04894873e5f2a69d89435341a8801738acee4ca898a8a3269ace7925acf7d7ca8278adfcd8"}, {0x88, 0x11f, 0x3f, "243a5bdacc0bf8cbeaa5215ffe31ba2b212388afaaac01082a3220f5c9f86b8250f3fe0286a5c15e84c1a5d0e92eec6a036f66e88812960f559f8fb17de3f1645a75d6f42fcd6f45fc22ac5e1f39a696fa6eb94a78d142a52d01d6c0c6eaea6a5391c40f8c987209f0ef530ba229a8d525d4a27cec6790"}, {0xe8, 0x18d, 0x6, "e2120b455167721050ee6fcee227b7ea9f958d2a1373fe81c8d95320a64807b5b8f9a9fa885da508c48db4b9d760351930d3b1d5a19658e378080b8c5ecb5dc0ad99e58b2bbba10e8f7fd01041487c6237388e439278709d00becfba708bedd812b7402a2acf162fed55dd9115b9a42a0d957a0c40767e154ccb84245ace7ff8ec1abc00635c764daef67711cf465dae32b56483564316b2f7cdb85d6cba5774cae4b10aed6dd5abe95cb0a743b4849c47b2722182972c818c74122865aa9d13c2673a0e85a21d6bd1d3b0245b75d0451e"}, {0x60, 0x119, 0x303, "28e913734c34ea65186e026bdc919e6e2119b63a57d799e6410d68753eb7c940eb49c486b12b9a6482512793e9d71a8ca4235c8b5ad8b1931db6a0049c5331658dd2c2a52d22ff203d0ff338"}], 0x13f0}}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f00000019c0)="848ec6d335ee6d5531adc7c35650fba17f0f5604ed154b68a767a702290519be63c1fed5c57dd60530c78c0d4972d5064921670314d4986d396403046dddafc8f84ba884f77206bfdda97d03983c1f0aff128e03fc7c4775bad7154bf05d5c81987ee701a9d61a933376d34ae2aef1c6fa36caf616596aa931affc5600d051adfe115427044b96eeede4964bfc50dc5d28c2e180ec462e8f044b0fedc0253ef08bc04eb4082fd32039a3d94ad45fb6509c5116da0e57bdbe1a2b2cf06efcd4d793c075545f1c850e37fad65fe1916c239f5cfbb65c5a8b11f69762a8bb39a7d3d2d71dc1813af433cf0a844d319063", 0xef}, {&(0x7f0000001ac0)="fa9fd4d3407cd5d9ab334d9f1ed74a94e7d34f01f6fdd6dd237acc28d1727c1d01d0c4254278f85a559c", 0x2a}, {&(0x7f0000001b00)="778ee6a0819e8fb490b97701045bb6c0eba175cd44272cefe7561e375af07029c0a6dfaf921788d21a3513b723aab6e46481f1f4a20c55170f836b5d37dbf871383ad3c464a593d52beec2e2a1a9bcba1d2f3163722d65782923b346e48c2a2a53fe32c50d898fc907a9f07fb6c78cbe2abfb5527f51d361c5db42c12760b5f5066abd3deec162c443dcd0cf34478ea436dca57d4e1764a620ce2f1aea1a1bbc648251b59931516e6fb5e8e3895c285449a278718042ccf230f794ab7ea29516096a52ce1d38f4870d9e6ba98a0d66d7ba9639112b4723586005a3baa9a9a760a8b7624dad3b33ef3aee9926847f7588324b97", 0xf3}, {&(0x7f0000001c00)="686ff868b26ec1e8ed4288add4f49ab70532aaee37121fddd374b8fe40123ae620e1db23a34f1c9100d91c77fb4e7ed745e290ecf27168c0", 0x38}, {&(0x7f0000001c40)="66d401aeb25498c652468c4e300da669f347c52a9179ab49bc4a2eb488d699f04891d8b279f0fb7c9395c50ca6c37b1dde2d0728ef046aa8f1b0c08f56623174756535dae121fc036cadf4ec947654b77667394af158933f6f5946596380c0f419f8c1396a09d87f1bf11bc091a4103cb4c4a7272532f8d997a17afc990be2b69b4d48ccf29cfb9f1fb23ee35aaed5525bf79f75cbd8bbdf158edfa7ce7ef33fcb4cd2ba6366838c59ad5869af4c56627be4ed195b1a449103dfed8f085ff7fdf9ce3c5b04f9f10a651b8a9580544d1cf2c1eb28efbe77a6f23f1150535510e2e4a98a51f54316294250dfce", 0xec}, {&(0x7f0000001d40)="468f1b019374db54b1e6a8f080adf4992c46729b225118c1b86a9725bf08df568d814da751afa8516ea376c0597702802286f4188950d4f2a3a312e717e07b4d27d7e81276422e81b4f4959a21c367af1c93ab712f55dfecc0c6280bb1008022d75325f84c62b43b311724d19fa378dbd5a86b0a469f096817aacc912152d5b9fbc8de5d67cc3f35c641fe93c57c4bc13f6e1836d58c9d5c1c8cde860627c45fe0e8605bd15cbc", 0xa7}, {&(0x7f0000001e00)="9e69067019d89508ae76f1492d9e9622d6b5405dc4855dfc083a941d28aa605c28e1a0f854823308f933057e013b13c11dc907abc4c47a4eaf676ead7268a7f248a4e7bed49ef09464412df5e1ef6f3a9dbdb4e66a5e7b34b2c6c2457c50b494ebdbed34313f3d80a04748b7cd3b5a54a1519a270d9d518f931fd6554152af52911ba5359111a2254a20dfba1fa1ba20", 0x90}, {&(0x7f0000001ec0)="46b98a2df67b8fd08e827fe0dab632c4ea55344c67ea23f8972409a45743b22c219c832617e12a49743770d8b33891cb2f446d88ab55d4aaa1fa7a8e78a47201ac49e2ce1d6e969bc04a532461d98119f8ebc6018ca090d657c8bcc85b070b3988f869a06d764126daf7454dcd4d6edc695938d5461e3a3cf258c01052848bfd7cc4d04ffc42f8684adc6c0df0683019c01eb99e56be42a49df5a8c65178e97245099137f7b0205838", 0xa9}, {&(0x7f0000001f80)="b53c1a63138d7b60c7967b5a0aa8128859312cff959427f9e834d90d06b0c004fd1a458c33d9a92ac7066d2a29c909a962ed548b398b94ba216dbaa263fb5f3e3942305af91f0b971fcbef24cf464bb7cadc269cf982ae046310720f9e32c694fa32628bff579c6ed681cc8413a5acc131ba848c48919bc467697d98d3ecd5ef4d48c35f21bbc9ca99b2047c6136efda70d9f899ab85d2eed653a78453f3681e0538fdea042c6b68c335f8e66fb2eef63749f0619546139dea9f17d304d87cb05ef628cea03714fc4cdfa59606c6b70c76d9", 0xd2}, {&(0x7f0000002080)="8c318cfa3e6b9cf12e8ad73424232e76589979ba06889772b2f417da818a82ee7a19817db3250fe4d2bbeac4e43d66be074900502e86adf6949368b13b434227726e64c02268d716ae4ea227c2379c196e292fa75e26233ba447e2dab2", 0x5d}], 0xa}}, {{&(0x7f00000021c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4, 0x4, 0x3, 0x2}}, 0x80, &(0x7f0000002400)=[{&(0x7f0000002240)="a10032b8e748f65ed3d0219d431201635a41ac0ca7b8bd88ce1b65aeb234650e4629919fe2eb6dbe0c585eb98959bdb4e6416b8c7e2d2bbd27f739f73362a3f5ad89303de243a48e5962e352068769ee93c9ac6a0ddab6ca927b880d98aff70e7dd4f31022496b245e2cde76281ace769e6b4507a52eb3cb14dde2cee90c976bbc027ba726d0775826b7e850a1", 0x8d}, {&(0x7f0000002300)="d756f05b9b826db47ba6220e8a7cd7a19b17f1cf1ec55e27a7b677915560a43be260b51f18ac9b6047b482fb5f5a30d6bea027b3c0b461e9bd25729fc77000a8b1374b0acc1ac109578d6475a63880fb9a7bddbcb5d35671f3b64dd4adabaf7f71c35c75665c699a1e61f0c2e04445a9c1476e2d6f587999915b7742b24418b1919e1b77441a229f889ad78ec76ddb0a0dbc2f0197e1435143f0891f511530c44c7f6bc1f9dc0a78562c244ddd59a0096bb01e922878b0d9c18b07ab06d1946989a8bc93c9", 0xc5}], 0x2, &(0x7f0000002440)=[{0x68, 0x111, 0xffffffffffff7fff, "6c528ef9e405a56c9bcdfecb1cb770430534eff8dfe3f28a50be510e443da150b485baeb3089523dffff8ac13b78912afce3c0e9ede03611fbd1bc0e9fe0bd31c88152654639e18f555451f90e1a9ebffd7224f4961c"}], 0x68}}, {{&(0x7f00000024c0)=@ipx={0x4, 0xfffffffffffffff8, 0x0, "ee985088bbae", 0x1}, 0x80, &(0x7f0000002800)=[{&(0x7f0000002540)="2cfa373a22f4bf8bb9d58dba94db8bd54189848b0a3be55f5f1a2273daa07244e5d482a34043e723fe9fb78ecfd7fedf83589af7f2934ce809a6ca88c7a2c939ba9e66ede85f946c51751b95d35945bb9c71191a41056fe000bd4e779d02eef745fd58f5b43ee5a882b59d189ba4d29cb25eea75918e46", 0x77}, {&(0x7f00000025c0)="779a10241c2a304613f75e356abb60a3dcbf406e101ecd27c2d77d87565cd02be9b4de3b6ef3a8973a0b7be1f78f6bffa2dd02118d4db1683db03e3600bc9bc26bcc0ddc7cf3e363ebf632ad89bafe1dbc36b95646a43cf3679f008e9a6979acbb74fb5afdda73dfe9d99ed328450a306409e45c9e036abf37f6d2c5c78d5fdee341414daace10ddfa2fbc45bd2a9aea1b598e33b24bc7ce431afffa4aafe75557fb6f1082ade3cc065b2ca553d72f7ee0809b8257e9d63b3426df22a39d42164c53ee168c80dae3b3cbceb034749bc95a2b7284c83bd9820e66959a97df771d90", 0xe1}, {&(0x7f00000026c0)="e7a93042a99916dc804d9cb591a5e991b93cccf2a807742602411ee91206b3b905c25f93a22f1f52d5b59a", 0x2b}, {&(0x7f0000002700)="33a280946de28a2ba8f0d48533a5befe5ec909e7ad95949ee28a44865d680c2d05212bf812f9ac6ad0c861635165dbad56583eb29a8fc1ddb9aae71e4fc33a1ba6cf67839fe935805fbb56454ec8ff5876b6862a54120c94b4af531e9a6f0327c78954e1e0194b84a69c9f45fd7a74693ed3547ee65d4988b523d40bcb012f98c6fb39da58631afa2f4607f9a22c15173d4f1d9f2cfedf3febbc09e990a586207cc176c9e7c45c5caf7e9f61f1cd3ddef3bf76ed06fe965b83277add51d18c8420db587f6f73343b867ca3f9bf7d006726d6fcf43611bc315a552651b504d825b92a002933b4cdb4d5fc3be068be296b", 0xf0}], 0x4, &(0x7f0000002840)=[{0x10, 0x10c, 0x1}, {0xd8, 0x10d, 0x80000001, "6b3bdf5c64190192fcdb3a33d3d0738b3d5c26fa4e3a9257a484a559c6b0d5a3526b4443ace0aa2ff31970f56aef61a9b570e318ef7d775128f5f1108404536b00170800c65e4b40c3f997c9b3e193b5c976b6e82a873fc686d4545217ea8a1c0b0c234a8423e162367dfc781b25c6659d2c0a45a058777bcc2006e6230e88beb5e06fce36ce3c7443ef1c3e445a4ca8b90105165f62ce6d84f45992949ddfce862582964b1a827a799ceaa8d09dfa2fd8c3a99255d7213b92c2e1ac3df568214ab5"}], 0xe8}}, {{&(0x7f0000002940)=@sco={0x1f, {0x9, 0x1, 0x52, 0x8, 0x7fff, 0x40000000000}}, 0x80, &(0x7f0000002f80)=[{&(0x7f00000029c0)="e4f53910fa5929d36b5e493fc5ed9d45abda4474750aeef98c172d2966f86a32746ccec55945f6e0d6a8b6908b865a37b5bc4139660d221cd3448a2bd9be3f4eb5e80360c7b2239f07fad452c93be92fe5639d726487acf78ecd2bf6303057eb5584b3b424a641b6b1983bb691edc058667a54df8a838a4faa5ba728e609cf6d82eae6b5cc156191698c57b129038e2e8ff62586f58ec6007d6f214daed0b97ebb96a801c832a6d42f330952740bdcc68e0673c4b907fefe4fce16b7d884f4af486b9f29528f21a4c0f19972e10cce5b7d03f3544396ce", 0xd7}, {&(0x7f0000002ac0)="07be15f49010a83ff6c5aa8cf65681dbebcdd9c90ba502cd7664d337883d496bf9f115", 0x23}, {&(0x7f0000002b00)="4ec2a2b91678358e94b32d2d7b09ac05bfa85196c078f98ac4399b273284648a4baa70a0f89d85cc4b5da4b24a4150eaa1e7a00a4bd6e9ef9f54a91eb662834f6dc6797394bb3374d1d71cafe503bf68816ab6b735c3ed0308c52440982511884033f986bdc0d1add964450cd4e2c9e0074f10487690e1", 0x77}, {&(0x7f0000002b80)="b13d488ec8fa8b3a4bc76ac7e0b049f89539808a8e75", 0x16}, {&(0x7f0000002bc0)="bc591f80a6d5166c01e11d1cff24fae6862faaffaa186ced989fd7c5aa8f409bfc6cc84aaed5f59154923805749041e70779837eb5e67955567e5f594901605629465e9b44ee44157ad51789cbd49828babae1c2d963617c7e39e11596f7cc4d7e84606c6525b8a928421cb827e44627c30d8c398e54a9cdc75f9ad21009e36082879c9db724dfceb0a7f5a696ad90464bc5983ca21d1910bd63", 0x9a}, {&(0x7f0000002c80)="37899fd9c142525f88806f718415ecba470b8b918b8f7d27d3792b38b88e844712e7f1359f39bf411bded664e521dba35ebb7ab0115e9659625105e92e356bbc6284a86e91", 0x45}, {&(0x7f0000002d00)="c4078eab053f143e4cd614698e6d70b8c9c9a63dc3a3c57db7cd73b1d58de3b3f4d4246ff7c0d9435dcaa9616e7dbf87a0aa68363cca4d0262c26d4b0edba18e7844621ec8f6c31a2f43f4bfa2ae7ffb4710ab234153906ceee521718b", 0x5d}, {&(0x7f0000002d80)="108ea23b5f4ecddb33e816233ea7f005d145f63f7e644619c2fa1e1e4981e1404884ae2b4ef360d0", 0x28}, {&(0x7f0000002dc0)="15b12a349b992e0a1e341ee3472d570be0ca0c8a885c6a60a64c53491b7ca90cb212a8415da9be52afbc7650239aa1e48ae294b6fdc524d826b2f3d5f0842e4f4a66b899d43b744e493a8fbaee87be6f5ec914cdc693cd6a40167006d309b5a107add4c854f5490b526e92269b4caf513b280ae95b92fe79376e92c0b766d325a00b177805ba68b9d8ed5629b525ede05f40775d0f0c72e75d9f46f233443041086c0901b58a11840973b6285aae1381de255c80c74dc5ea015c4d538d355b482a0cdf897bf2bd51370092d6cb", 0xcd}, {&(0x7f0000002ec0)="6a4f84ce9212f94df4b10a4d1ba639ad8b386bb41c21a6c723c6edc39424cea56f42be4dc51b3d47d75c9b636a13a9804ec8482cfaad351c4e02149def10c89c3adefbd909902b829d5639927489155f846449c17102b1c0df06a59d4b7bd2d25211aeed30a2be3928c7464225bcc35b9f6ba56e195e41a31207c88accbcd1add3aad21ebe8ce49d9066f3", 0x8b}], 0xa, &(0x7f0000003040)=[{0x100, 0x11, 0x1, "8010b66a3728a44a8ced34c3f9b3471528d42b92fb17d365ac0775a2bbdcfcb5d7f84106ade7e35e7601862ada3dedd91070c0b07f6cefbd9f308838aaa0eb248e051b3566e0412c4b1d9461766a2a4f59861628c4933dbbb6e21952af1837c70ab512decadad6c63c4d828169567615d023a17ea919d8c03d975bb8371197778805e81aeb82181c1fa9f14515bee39f31215fce3014ec0145ee6f847383a2a99dc62c80f48e2a6ad7a43e0f53e544c62fcc3205883fe85df7211a3b4ec4f0e6a58059aa86eb893771d1ffa5ec1f2dd381d03491f510f901b3be7698fdb78c0e5f051fdae1a5204ce6"}, {0xa0, 0x13a, 0x2, "e75efedf6db7ed9703d1ae493ae4f6408f4c89758afe8bd107e01e2404fcb9c21d4ad1e6a835ab8773b62a9839c275101ddeac8a62722b4dc96ed0d2a65b269050139f7d32b276d57314cda8c8972f300f4881bd8432fef378c110f2f798babc3d13b50a8140669fb4e5fc51eaa6366863ed9e271748e1938a1daaf87f7189377fd5f14eccf6b63b5956"}, {0xa8, 0x10d, 0x7, "35cf49094315d7588aaacc362922588c1ad2aabb764f89750cfadf35e1ac55716dc993b45a86d0d1f536d32275ab006db3e5ca628f4754781b91990cbe6fd8c4b6ef091a6730ffcf3e024cba0735bf573d549277c6c9b30df168a69fda0138cf47c7cffbbd6f5a53f07973aea029a9ee4d4793ecba5b6f06a257a98009c4c55ad8e9fee27035590b40bec3fa56c5f3954a"}, {0x1010, 0x1, 0x3ee, "152ef8be164af3e4af3bfc6cbef586d1af89831aa4c1b4cf5fd0365a9e622dd364fae6bd3bbe971365d9078447fd45b0aef94a23def49392bd53ab9102ad02f2e5e15d41f7b5036053fcfa24251638318037524a2e8ceb9c7086d382f0c077361e6233684f522090794730bc108ba78fefcea730665881b4e401fbe68fc6029c0a6485d737660b31e079d8cf921007f974ea112750e2e56372bd98dcab48b2ec4f81c6aa01674bcbe6bd69483e3317b5d84898014e4bc25278c7765844eb66a68a4edc76e745d88d85ac523e12c774cfefed39153536546f411103f0b7a5f3a22e5314c5f185a3409fa036356f89ae0848ac2252fa033a3134263fb1c1186d80424e2a061ce5329d6bdde2088ca412c59c0e2fac7c8ce2f19c3c495c71ddd06777d0d669d142cf21c16538cf110bed143263d9537528569ae4132341683e3ed5fc376ed52169c59b73dc78b08ebc6f1f3cb6c70676a23d77167d9434e79a26560f2dc2b5bd5adab40b405879dd1651c84abddf661ac52794a546f0f8543fbcb6d8708b2b63644bfa76f4f3f27e4a833fb0c06e06179d06bf17dccac375c9796be71211287031766f811db5174d348031c240cf93a1b7a3a522925d343f4fb5f59f697d674a578ed829d05221257b1589fe1669ae20a2bb2716fbb94c1d47a82125605a03a8ea91da3f13073ac4d91b9fa29c07f98f5315ea9417bcc7cf7b481ee00c63125c156a6a30046542fd7c1fa340998c7e9994acfb5078ce4aae2b7e13fd6b56f67b784a524bef2cc2cf1f7df911651d1dfcbdfc2b90c70790789114b1da8d3cc25257988bf3f054e105629403c891825562d2b575a9fa97e8305d47844d3575de506a87ecb213ea53296e6cd6df9347667771293a85419af7dc0beab5c3307b1b24b1d98d6eadca37f69af06aaf22936920f6f7094e2186f69f813d68210d0266bc1bfe59bb1201f0d9aefbf9a3395d40b55ccde6f6559fa5d8c56b9e94f6a91fe5c2471cec534f6ebfe6dfa4c3469ae4bfcc0c73d924b7e2e7271820ed84eda0142cd49ba0efca4b5c25411d0b3688aae68d4d0498d8efb28376c66a2069470861da1ffba7fd60fbfae6312066780db15d1f67e332a75ca92d6422a9f11d1073c4712232a8a2b7e11223fa6e0037808c2dd0e88b644fe0e468c3c2ac4d252a0fa29ffd9ccbc7fd761a279a5c5efde036c68c88cdb133a116f972e3d652f3989f3b956f21538b02238c4323e4937de1f26b335c2328fc6f5c30f9d5e3a7b5fc19a84692ea9fbe11ac02c9201d199d84f0447b4bbea191ef3375346feca21ef7b5d3e5926ae5c6d214b20fa07a1fe9137908f99315d75046e98b00040a2665ef1a9a9010d9274fcf7dbc298eb65c745cc3e50d56ed63dc4ba3ad7c9db7144e72fd490bc78368cd16352c6a66c8e05c8a053e1aeceb786bb34015d69128301d5ff9db5cfdcf214def3de703a889abf0fce8bf047f418d0531a04ab0dcd089e4df5809ecf790b484c8812542ed21bf5acb30157f98392d61eed428bb441fcf5b3b2876beaa289e6b8aa4bd83626449541fba63b88a92b4878eccf262457a69c20f3c4b30f7b9d216759e9219152470de723133e791bf9a22d6b14e0b56204fea735d6ab585a71255be3f7caef3e649c5d2f9d6a57123b2a74e893e177bfaab5560d748dd063faef573f4960938377e25735a87885b3b647dae0372fa94eeaf95c764e390e64528c1a36f57f7d7e49e6ecb668cc4cb961ac146ac88a7df51e7d8908175be9bc59a2d13423d9ee74ddaa8b892f3401515a5eec4b6b669d388d6e2c247213c74a8fd795b8dee10d034628d5e1555a943f324c1f3c70253a23d7f5410e2aa07216c94dd73f1872a54a01723c99f25165fd1b46b66b0a93d62dba6adfbe05dea1b3928f8ad4bf96ad85056570521b6c4c343008d1e0e1b84ee82ce905c809582b3328f158289b32382acf277736d5bb21429602ec0a203b5c20741805236a2551a3a615103e8d449795758d076a12e5341eaf7f23927023e5a400b74d47599d4423deaaf1e69b1d874daf78b8b2663d1aab8724f0c6d667ae08b2b16c5aef0f6a9aec767a03b4695de286b918732983fb30e41981dd4692cdb7f999b8774ad1fae6a552b6e4976a8c4f8ee6bc9d4fcc17c3c5689618976ad8a8a6bd25e8b7886abfbdc770277c557e3f371ea5ccb41b4514bf94463e78df31af79a52a8f8a566826a42f33eb0f09009ffb1db18f5f001f48449e081216e24e169ee8a2012abec99c89fcba1931a0f05433830b23afb49d593a4dc38c2218a93086eb551e17db393e490efca0512c40d9973ca781c8515c44137c1b5cd3a8ff40c91d2d07d595342c9ad29b0e5e5f1d781610db167b63b8e479c4f252ca4196948b393f9ec60d97bdf558197f7aa64a3a3942b2e382d2366f7c5797c10cbf753dd9c07c8d6575a8b7ccee7ee9f867c9f50699d47f89682b643d09e18ef479db52e12deeef2e81ee7c56400d79a825c1324446c945e1a1f426112a4b5ad61f1a36f4d4e4211b102002a32ca7ef793afe508afdf2de513d3c110788b7a74715a459388394e3f5b27fa7a0c9db3bade65d7b96565b935bc70fd9d2c899fc757cfe2f0d8415c8eb38bc68fb25d22bfbf5571bb12a61c1452c0023fb6638158fdee97dc26fa78d37770f2d30d006926d2f2bff696cccba68bc0a6b8a684b7cd58b4018cee83ac2324a782591eabb33cf78e2f0b2f5a72f593b924f73514d9592348cc7d2e5dee0e51d274b73f499b1f967c6abfa0b9b4afb1231c7c6d7490b37b99e77133f1acc4bae156f60c470330334da34655107423886b84ebab8f8af1544883e0d1bbd4ea4eb0bd1794d487ec39c0f50eff88801c452908dfb89d28dad8dd9d1f9819e12e335c5c2d10300d6785d5cb9bfbd874a6e35cbb737a3e37e472733a101f748e1ddcbd82897718c6c1095082b024106ce67f0f353c132a711de7bae47054edda66546bdb52c99ad315701cc7d05ca116594f30c81d1913e6996c4adfdc8d7031949afdbbdfb6b9db47b0e1e209c682c6b988c9bbeb1771e7f719ede959483fc5700d0e2ae9abe534a85e62b4b26807799d24192bcb3a9fcc2161d9f81e95506c1de22d81c3c3d7a7f469298b04aee197ea5827661893780cbcaa2a85d975f19a32634408ac6c3879a27789325b3bac0e31d97f228db8c2153dc0285a3519258dcd77cb3431155c7570e32ccae5ee82238a25ddf85967ba002b06a209a8a2f875e0f5c1095e615094d33e7b81324ac7510f529a5321a78d40d95ed9b368a2c3aecc016ed98a5b68ddbd6111c4a4ae676d24a0930153288f080d5ebf7f958f1302540467d59a3debc4f47afbdf28dde84cf48597ccedf77f473407148c151f9fb2c75c505bfae7970b794951538fbcba5645675c0d336a312e4da2f5746b4215c222e08243c888cb2cc65cf1a64fbf017482e10aab56724bac8c7840528cf4c5952d28eaa8de285c5f8c76d2950ac5b265bfdde56c3727452fa4e30105b1ff27b50e5a4bfb7319fc9edfae69201ba6409826f30afcae312306d257781621dee8cf32d95bd841396bff0dccf0348a908b1b21879bc36a46eeb698b8afaaf943dd91755d999438a202d996a77062aa6257a82604123d76d2f103106c26edb523f78b0cf0a8906069aabe7427011f087816e73738855a8519e65a3206e5f295608351bcd55daa9627af7c41ce54ce7e1d1030487e0d478d3765c59dd2171a7742bf177f50e2c5dd1e04e6cd09d3af87ed9446962417c3d5381e7c7eec846272044ad83302eae6854c31f2379d25a6997baefb423116be57f3fae814814062fa3c9a68c9eebc5c75f145611da83f11af2e0a1ee55df008c1f20ef6cbd756af237bf74600bd99c423f1028de086c50acb34c6e03dd7153612e501f3b8cc98c3685b6bb1a5341ef3a89465cb64340b2b7f285886f44b052612e1068c60e6c50fc9dafca8fe4e085f8741ede21fc243b459dadac7ea9dc3b228b0afbf83c12d49d89bfd890b6b0cbfa9af4c937a9a9f8129613128648b133648227ee87e9d8137382e05e45e036cb76fe18e563d5fd0cae117840e7799cdb6125027da82e4d7fd707793f02609876ba8ddcc3804185349653e94ce6919a4036c6b5edd44a7bd3b514b9c604804fea11f3e16dcdd8fb12810da726e79c6043d0e14543e51f71dba36ac7e0300aa06b0fb42b7ef630f60693fe3898eee60baaa54f4397968313555304ee0d27a35b8ebef58fd883f1d2ae56bded23cae5dcbcc2f541f4f2fd5fa314de0f6e8c1c01bddbfde11c850a973e78269cfee93afe07566f341f143a587982044be85afdef4e34f6f409203337ccfd47c40bc86e3bb4086cc7092c520c7f5b4808fe921359836cc254e8e6eede149ef1934237d1568bbf0cdb51eeaf3b1c06012316402c064546fb3228cb46ed10bc7c44a266bfac7d7fd5d97270eed09c90dbea8fa6b112e0659152abe82f346825fc71fbaf53847fe3d9ae1dda52b06096d5ccaa0bf11aa046d1729d30446c6c6b36832d498cd5e83ba059948e2c2824689942b2e43d6719a64bd91960da6c69cd846ddc6810ef194e8610854c17a2ad7acfefa09dfd02698c858db07833be0bd42c49576f791f98e240ed47c75c37f9deab5b6053f98435019604757ed547c94acfcdc381ad87e73d0bac72549910b6e241cd198dc500c5567ac555e9a83b636c62b62a3e29fe7b5d55e660b6959e29f4bcbc340791fa8de31895951188b2b93297a61cdc1366cab1cce19075b06b049a45bcad9589b09104f55991a52f61f30e9b89825af07e7773575408373797d9be6c46d487574594e18eb40b7e951a262a4e88592972ec357b608d4ae7faf3d1e1d5c512b2601f7f1ad892e5b7844ac2f6b9f852f2cd248f227ecffa870857dfff4b84d90d80585ce65495bd6a8b28d635d0da2a3c7118d84ea8c98137ae5a337136b3703cf08799a72b59a0d6d15c48f1640cd642283d4920327361fae40773208df24dd7bf53218cc3aeab20b26ec90775c242fcc43d652646e9f994f0b0eb2402affdde221897ab688a92a35a9fa4a52adabbff997fa604aa025bd90d0d8e685a7fedcd89b8bd60ed3e6a628943f4d7d1d08719d44ecd83351d9892613bc78742063238ddd142b892d9669b0ceed33b373495d88381170049047dcc0d98f4074a73d4704a3ea36e7750843b6ef4952172680f32b30b4e01b897d06d8b04756e333d2a6c83065907c0597439c60f82d37517fce418ebde7be63a8194f29050c419c0387ef9127b7a64978b417429145c43edfb88a9fdc832cfd7069c4b17c9b2106070db4f617e699154a1a07c16702fe33262c3c1706b73453923f38741e32ece0e18c76cd8741aa2dfb3b6675072a9b3ab3bdabda79ed1e6583cc748d6c7524a38b68063dde3a10f504ac3f15a7e6f81ef081ebd4b572dcbedd6ba55f81a6484cb68a901f30c3b925a7a9f9718d1bab1a1ef56ed229afe4e34f5b6aa83129023423480ae19405387aa8c6dda3a7687450597efb0c50e5e65053e0fabc3c1150850c26ad958e781c59efe2607610566bd74b20e7eb59c0944d81729c988f951eda67fa13d40ee66a74da9691034470d1440193dd34db815e960cf2494caa9c88022bd76a4a9f0d3d587efa0f6f59eec5d9c2b28fd7085d2de6cceb2e95dd77093187542de3eef46e6cb45abb66142084a6999e3b784dceef6ec3c9ca44df855f4f5e4d2d3408b44163af0a83e5a389d272100d5fbec0af2da9d66cc1e375fce3"}, {0x90, 0x117, 0x8, "3c2b7f02f0ca82c646527993c2c8c6a8097f92e34cbb522f22c08a656e282776cc4b806aef98e716b1d90e64b234eaef4556ea70a395fad0f79aeba1ebf6e9ce955b815638a8862664ef8ce033f974d814f7d1ec55e893742e3c9f8587066d8f7a888af5068ebffb4506bea8f5d81842177fb2395d95fd69b4"}], 0x12e8}}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000004340)="7bf4aa06dbe50cb2274c053effac413743fd01a94d7cb89134678e71f16064aff5ffbdc137805d10d260b3107bbba49e85353ed49fafce960321c6567a0df0d2362982da77e7f49d8925b384e1c4097dec728d0a02bdf754564d61cfa009c9d487b15f2ac27117d7de1e9fdbeb1bc718e97cff3388f2e426d5f9ff9e867666f8a55eedae5228393ac2a1552b9fb4d4dca7e300dd", 0x94}, {&(0x7f0000004400)="d08ad3fb49917a5bde11c31040f9e54bee79", 0x12}, {&(0x7f0000004440)="911da37cbab505bf9f9cdb79c8a227a695a65c61e62aabccf19b3fcfae8da374648f095b6c9b0ae9eecc5d4b118f6b2d6a1b43ef7885530d79d34e0684f61a1055f763c54bfa20e80c9c4fdb7586d525ee6baefec0eb10f03f5408b01c5f22f6e521a64be4d65e523705e841d56f56e6d305e5bcdf09dba450b6f109eab3639ac1d746b502d5fa79fe49d1e21df90e499ef3d7fd8d6895b4e4f51ba5e22308b2af3aa23e54a8c61b690d06cf0584388792c82e7e578203904f738e3c55ea2a95aa21675fe179fbacd45ffa1a02b688ea7bf8591f96e48c6f", 0xd8}], 0x3}}], 0x6, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:05 executing program 2: r0 = getpid() perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 469.850117] protocol 88fb is buggy, dev hsr_slave_0 [ 469.855254] protocol 88fb is buggy, dev hsr_slave_1 23:42:05 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x2, 0x800) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000340)={@rand_addr=0x8, @multicast1}, 0x8) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_tcp_int(r0, 0x6, 0x3f, &(0x7f0000000300)=0x5, 0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000080)=0x1, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket(0xb, 0x6, 0x800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:05 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000300)={0xffffffffffffffff}, 0x113, 0x4}}, 0x20) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r1, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r2, r3}}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1}}}, 0x0, 0x4000000004, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0x30) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:05 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(0x0) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:05 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$kcm(0x29, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000500)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = syz_open_dev$dri(&(0x7f0000000700)='/dev/dri/card#\x00', 0x659, 0x40) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000780)={0x1, &(0x7f0000000740)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f00000008c0)={r3, 0x8, &(0x7f00000007c0)=[0x8, 0x1, 0x20, 0x3ff, 0x0, 0x9d, 0x7, 0x1], &(0x7f0000000800)=[0x8, 0x1ff], 0x40, 0x1, 0xfffffffffffffffb, &(0x7f0000000840)=[0x400], &(0x7f0000000880)=[0x0, 0x32]}) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f0000000900)={0xfffffffffffff000, 0x5, 0x800, 0x8001}, 0x10) r4 = syz_open_dev$admmidi(&(0x7f0000000940)='/dev/admmidi#\x00', 0x6, 0x2) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x8) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f00000006c0)={&(0x7f0000000300)=@generic={0x11, "45d6308b5fef808d09cc2723b7b73e770c19150d1bcf117af3855a06e07b7417cf1d32feaea20176bf2d1b0ac33834d400717b582b510c0704c3a4e45b1cf60fd15d5f9e3b332d326fcc7ab6c703a51f97df54d4b92b1e5c0ebadfaede03e498b6da77486b046a8067bc8f759bb0fd23110fb31e0ca124e9717706cbf8af"}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000380)="02054fc7375524b9eda274aea85d48822bf8c1dd474f44478974885bcd3d7a6425003eb87a2841c8ef65ef88f1206d65987516aaec89d9f88dad9a794a11f3af0938101ca5239fd9871d119d22f9d88e96551a27b31e4b08b4f62ae134843cc9efe3c81dd3a4fd664b2aaf53ea377810ec284681e82c9c9e11f265", 0x7b}, {&(0x7f0000000400)="f24324e4559b473ece5b5237a7df858c90d150746c8ccf687f53fd49a522ed76cc0526fd5a241a2a0fe47cfdc69c1a62b3f49151e6a7e9b7959d71f1963e1a90df7b57fc7c07fe10ee76077f1cf33cc5d4325a18397dfe148cc689ff65f77d1d2448ea889d203a01f0dee8608e3d87d60a823d63d511714f6d40c8fc2d782ca16991b7af5b14b325c6623061a3d1e5bf156b76aedaaec15257da42d81d6d08c8f32c0f9a8638940637cdd0601c6c001a030bf1a88c08eae5ea589628", 0xbc}, {&(0x7f00000004c0)="32b26f04006633cba5f403070143fae414b3ce3c5f588f614070656219fe57fb29259dc781b8449601a8210a995d6fb53bbb8eb57f24b69bfa3e37b61f47f2196dcf102bf903ffd10cbe01a70fe199344ab5ea5a5a3e89c1c56714dcd2b625fe5e1e274cda4c110f35f5cee73821c7798bbae4dba7913073f3d2c62e41dea2a88f43f34d46dcc632f95d5a99a80c63b7d860b7571ff6b452634815c9efa0e43812f560924a98c686cb3cb0", 0xab}, {&(0x7f0000000080)="dd0396323163b99a1814c05bf6be63d5a50da5090931df644bd19e6b7703003101789d1dc2bd08bc631977c9abbd4c57b2a3421fb3a7a9dc0c1e8ecd0d", 0x3d}], 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="60000000000000000c010000ffedffffe5e6acd445b423da924b77f6130c70a7745ff34626a294bae5d17ca62550a443abbffbb77ea32fd68fb5d48b2690e486fa5d07d7c8a7b444ac5096885e0093da49319693f52aad30a0e18ff4389fde00780000000000000001000000400000008642a3ef89aa044cae42892caa27f9bf236b77e3ac609eee31ed6fd91fd6edb57d6701002f5a3eaac41219564bb655aac7a3c465d471591df0dd94c9d9209f301b93c8c5f3cf986e4dfefa6a20aa1b849cacba3ef320bf9a4c70cf2571c8e345d4ffd6682f051e00"], 0xd8}, 0x80) socket$nl_xfrm(0x10, 0x3, 0x6) [ 470.230577] device bridge_slave_1 left promiscuous mode [ 470.236136] bridge0: port 2(bridge_slave_1) entered disabled state [ 470.301092] device bridge_slave_0 left promiscuous mode [ 470.308314] bridge0: port 1(bridge_slave_0) entered disabled state [ 470.493938] device hsr_slave_1 left promiscuous mode [ 470.549755] device hsr_slave_0 left promiscuous mode [ 470.591059] team0 (unregistering): Port device team_slave_1 removed [ 470.627838] team0 (unregistering): Port device team_slave_0 removed [ 470.654740] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 470.702871] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 470.870227] bond0 (unregistering): Released all slaves [ 472.521455] IPVS: ftp: loaded support on port[0] = 21 [ 473.415758] chnl_net:caif_netlink_parms(): no params data found [ 473.455594] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.462183] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.469010] device bridge_slave_0 entered promiscuous mode [ 473.475951] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.482628] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.489451] device bridge_slave_1 entered promiscuous mode [ 473.508340] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 473.517538] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 473.537370] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 473.544690] team0: Port device team_slave_0 added [ 473.550789] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 473.557810] team0: Port device team_slave_1 added [ 473.563129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 473.570560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 473.632416] device hsr_slave_0 entered promiscuous mode [ 473.700432] device hsr_slave_1 entered promiscuous mode [ 473.740707] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 473.747570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 473.760231] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.766582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.773231] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.779574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.809429] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 473.815841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 473.824715] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 473.832996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 473.840298] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.847969] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.857069] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 473.863460] 8021q: adding VLAN 0 to HW filter on device team0 [ 473.871986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 473.879503] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.885898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 473.896166] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 473.903881] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.910260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 473.930890] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 473.938531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 473.946566] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 473.954348] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 473.963718] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 473.974069] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 473.980724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 473.987631] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.002779] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 474.015933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 474.400610] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:10 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:10 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000300)={0x4, 0x0, [{0xaeb, 0x0, 0x917d}, {0x40000099}, {0x870, 0x0, 0x7a}, {0xba2}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000380)) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000080)={0x2, 0x6, 0x5}) 23:42:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:10 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:10 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(0x0) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:10 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x80050, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$getown(r0, 0x9) fcntl$lock(r1, 0x0, &(0x7f0000000000)={0x2, 0x5, 0xed, 0x1d3, r2}) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 475.371779] Unknown ioctl 1074310793 [ 475.380884] Unknown ioctl 35309 [ 475.385664] Unknown ioctl 1074835092 23:42:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") splice(r0, &(0x7f0000000000), r0, &(0x7f0000000080), 0x57, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x3445, 0x0, 0x0, 0x41c1, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xe00, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000040)="11dcbb0d5e0bcfe4fbf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000300)=[@in6={0xa, 0x4e22, 0x80000001, @local, 0x2}, @in6={0xa, 0x4e20, 0x1ff, @remote, 0x8}, @in6={0xa, 0x4e24, 0x400000000000000, @rand_addr="07dbe9968c5b50b885eb1b67c9fc16f9", 0x7}], 0x54) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) 23:42:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:11 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="00010000", @ANYRES16=r3, @ANYBLOB="020028bd7000fddbdf25010000000800060000010000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x44000) 23:42:11 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r0, 0x0, 0x12, &(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff}, 0x30) tkill(r2, 0x0) r3 = syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x7, 0x0) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RRENAMEAT(r3, &(0x7f0000000380)={0x7, 0x4b, 0x2}, 0x7) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7f, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f, 0x40000) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000080)={0x1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e24, @local}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xfd9b) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x10000, 0x80000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000800)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000007c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1f4}, 0x1, 0x0, 0x0, 0x800}, 0x20004041) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x400000, 0x0) ioctl$BLKIOOPT(r4, 0x1279, &(0x7f00000004c0)) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ubi_ctrl\x00', 0x40000, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') seccomp(0x1, 0x1, &(0x7f0000000900)={0x5, &(0x7f00000008c0)=[{0x4, 0x36652f05, 0x66b1, 0x4}, {0x5, 0x9, 0x5, 0x7}, {0x6, 0xcc, 0x1, 0x4}, {0x0, 0x3, 0x8, 0x80}, {0x7, 0x2a8, 0xd1c, 0x100000001}]}) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r6, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8000) sendto$inet6(r4, &(0x7f0000000840)="cc29bc6f55712eff", 0x8, 0x4000, &(0x7f0000000880)={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0xb}, 0x9}, 0x1c) setsockopt$bt_BT_POWER(r5, 0x112, 0x9, &(0x7f0000000980)=0x9, 0x1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @multicast1, @dev}, &(0x7f0000000080)=0xc) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x9, 0xffffffffffff6f56, 0x2000007ff, 0x7, 0x4}, 0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x2}, &(0x7f0000000380)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000c40)={r3, 0x1f}, &(0x7f0000000c80)=0x8) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2180, 0x0) write$P9_RATTACH(r4, &(0x7f0000000080)={0x14, 0x69, 0x2, {0x0, 0x2}}, 0x14) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000500)=0xe8) sendmsg$nl_route_sched(r4, &(0x7f0000000c00)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000540)=@newtclass={0x658, 0x28, 0x200, 0x70bd2c, 0x25dfdbfe, {0x0, r5, {0xfff2}, {0x3, 0xd}, {0xffeb, 0xfff3}}, [@tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x34, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x3, 0x0, 0x3d0c}}, @TCA_HFSC_FSC={0x10, 0x2, {0x5, 0x5}}, @TCA_HFSC_FSC={0x10, 0x2, {0x8, 0x20, 0x7}}]}}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x438, 0x2, [@TCA_HTB_PARMS={0x30, 0x1, {{0x5, 0x0, 0x3, 0x7, 0x4, 0x9}, {0x5, 0x0, 0x7, 0x0, 0xffff, 0x7}, 0x7ff, 0x5, 0x7, 0x100, 0xffffffff7fffffff}}, @TCA_HTB_RTAB={0x404, 0x4, [0x4c72, 0x2, 0x8, 0x5, 0x5, 0x6, 0x2, 0x401, 0x0, 0x703, 0x80, 0x1, 0x0, 0x453, 0x5, 0x200, 0x2, 0x3ff, 0x80000000, 0x10000, 0xf32, 0xd953, 0x3, 0xffff, 0x1176, 0x3, 0x7fffffff0000000, 0x4, 0x3, 0x5, 0x0, 0xa45, 0x4, 0x200, 0x20, 0x711, 0x6, 0x9, 0x80, 0x0, 0x508, 0x3, 0x6, 0x0, 0x9, 0x2, 0x1f, 0x1ff, 0x9, 0x2, 0x5fbd, 0xfffffffffffffffd, 0x1, 0x6, 0x81, 0x6, 0x43ed, 0x3, 0x1, 0x7, 0x2, 0x7ff, 0x5, 0x629177a9, 0x401, 0x100000000, 0x97a7, 0x7274dee9, 0x1, 0x40, 0x1, 0x800000, 0x9, 0xfffffffffffffff9, 0xfffffffffffffffe, 0x68d, 0x7f, 0x4, 0x5, 0x8000, 0x7, 0xffc0000000000000, 0x3, 0x4, 0x7, 0x0, 0x4, 0xc9, 0xfffffffffffffffc, 0x8a7a, 0x7, 0x6, 0x0, 0x2, 0x8, 0xfffffffffffff665, 0x108a, 0x4, 0x500, 0x0, 0x3, 0x1f, 0x10001, 0x1000, 0x8, 0x2, 0x5, 0xfffffffffffffff7, 0x3f, 0xdc, 0x0, 0x7, 0x0, 0x0, 0x6, 0x5, 0x7fff, 0x8328, 0x7, 0x8001, 0x5, 0x26, 0x3, 0x1000, 0x3, 0x7, 0x100, 0x2, 0x80000001, 0x9, 0x12, 0xfffffffffffffff7, 0x1ff, 0xffffffffffffffa1, 0x7fffffff, 0x1000000, 0x3ff, 0xfc, 0x4, 0x1, 0xb64e, 0x124, 0x1, 0x1, 0xda4, 0x9, 0x100, 0x3ff, 0x84, 0x751c, 0x200, 0x5, 0xfffffffffffffffa, 0x5900000, 0x8, 0x7, 0x2, 0x7, 0x1e00000000000000, 0x2, 0x544, 0x1, 0x0, 0x100000001, 0x2, 0x6, 0xffffffff, 0x7, 0xffffffff, 0xfffffffeffffffff, 0xffffffffffffff43, 0x3, 0x9d5, 0x0, 0x7, 0x4, 0x7fffffff, 0x8, 0xda, 0x7fffffff, 0x280000000, 0x1, 0x0, 0x4, 0xa31, 0x7fff, 0x2, 0xff, 0xabf, 0x7fff, 0x2, 0x1ff, 0x6, 0x8, 0x4ae, 0x40, 0x817, 0x6, 0x1ff, 0x3, 0x100, 0x1ff, 0x0, 0x9, 0x45f9, 0xd6, 0x7, 0x3, 0x1, 0x1ff, 0x5, 0xc24, 0x1, 0x7fffffff, 0xfffffffffffffff8, 0x100, 0x9, 0xf9, 0x7d, 0x6, 0x7fff, 0x4, 0x8, 0xffffffff, 0x3f, 0x7, 0x68, 0x6, 0x5, 0x7, 0x5, 0x200, 0x1f, 0x2, 0x2, 0x2, 0x5, 0x2, 0x3, 0x4, 0xab91, 0x7, 0x5, 0xd87f, 0x5, 0x1, 0x7, 0x3, 0x8, 0x7ff, 0x0, 0x3e83, 0x7, 0xffffffff, 0x2, 0x2]}]}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x88, 0x2, [@TCA_ATM_EXCESS={0x8, 0x4, {0xfffd, 0xffef}}, @TCA_ATM_EXCESS={0x8, 0x4, {0x8, 0xfffb}}, @TCA_ATM_FD={0x8, 0x1, r1}, @TCA_ATM_EXCESS={0x8, 0x4, {0x10, 0xfff3}}, @TCA_ATM_FD={0x8, 0x1, r4}, @TCA_ATM_HDR={0x2c, 0x3, "cebf1b65a475761690a4a31dfc219b321d64549e8ebedf976369382a843c916d80785af7acd75b12"}, @TCA_ATM_HDR={0x8, 0x3, "56866286"}, @TCA_ATM_HDR={0x28, 0x3, "2b88673b2ce94506b503beba6a3ed5f1d5dd7013eee4556659507de4b174a89c3f"}]}}, @TCA_RATE={0x8, 0x5, {0x7, 0x28}}, @tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x14, 0x2, [@TCA_QFQ_LMAX={0x8, 0x2, 0x10000}, @TCA_QFQ_LMAX={0x8, 0x2, 0x3}]}}, @TCA_RATE={0x8, 0x5, {0x80, 0x40}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x54, 0x2, [@TCA_CBQ_LSSOPT={0x18, 0x1, {0xc, 0x0, 0x13, 0x7fff, 0x3, 0x858, 0x0, 0xff}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x26, 0x2, 0x3, 0x1, 0x200, 0x4, 0x4, 0x54b}}, @TCA_CBQ_RATE={0x10, 0x5, {0xffffffffffffff81, 0x1, 0x0, 0x4, 0x4, 0xffffffffffffff70}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x20, 0x8, 0x5, 0x8, 0x7, 0x1}}]}}, @tclass_kind_options=@c_atm={{0x8, 0x1, 'atm\x00'}, {0x3c, 0x2, [@TCA_ATM_FD={0x8, 0x1, r2}, @TCA_ATM_FD={0x8, 0x1, r1}, @TCA_ATM_FD={0x8, 0x1, r4}, @TCA_ATM_HDR={0x20, 0x3, "45d4528e452479dba1b91e607f1b48fcb9868e76ad27087054df"}]}}, @TCA_RATE={0x8, 0x5, {0x9, 0x80}}, @tclass_kind_options=@c_hfsc={{0xc, 0x1, 'hfsc\x00'}, {0x44, 0x2, [@TCA_HFSC_RSC={0x10, 0x1, {0x0, 0x4, 0x5}}, @TCA_HFSC_FSC={0x10, 0x2, {0x8000000000, 0x0, 0x6}}, @TCA_HFSC_RSC={0x10, 0x1, {0x9, 0xfffffffffffffe01, 0x3}}, @TCA_HFSC_USC={0x10, 0x3, {0x5, 0x404d3526, 0x100}}]}}]}, 0x658}, 0x1, 0x0, 0x0, 0x4000}, 0x84) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:11 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 476.351904] device bridge_slave_1 left promiscuous mode [ 476.358181] bridge0: port 2(bridge_slave_1) entered disabled state [ 476.424521] device bridge_slave_0 left promiscuous mode [ 476.435076] bridge0: port 1(bridge_slave_0) entered disabled state [ 476.672579] device hsr_slave_1 left promiscuous mode [ 476.724784] device hsr_slave_0 left promiscuous mode [ 476.764502] team0 (unregistering): Port device team_slave_1 removed [ 476.776299] team0 (unregistering): Port device team_slave_0 removed [ 476.787790] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 476.824645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 476.908435] bond0 (unregistering): Released all slaves [ 478.651416] IPVS: ftp: loaded support on port[0] = 21 [ 479.443797] chnl_net:caif_netlink_parms(): no params data found [ 479.479368] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.487603] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.494684] device bridge_slave_0 entered promiscuous mode [ 479.503196] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.509596] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.516725] device bridge_slave_1 entered promiscuous mode [ 479.534825] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 479.544157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 479.561122] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 479.568171] team0: Port device team_slave_0 added [ 479.573683] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 479.581012] team0: Port device team_slave_1 added [ 479.586174] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 479.593529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 479.663981] device hsr_slave_0 entered promiscuous mode [ 479.700482] device hsr_slave_1 entered promiscuous mode [ 479.761463] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 479.768401] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 479.781601] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.787963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.794656] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.801058] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.831412] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 479.837505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 479.845804] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 479.854501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 479.862850] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.879914] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.889559] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 479.895909] 8021q: adding VLAN 0 to HW filter on device team0 [ 479.904539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 479.912263] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.918603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.930742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 479.938336] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.944752] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.961978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 479.969770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 479.977926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 479.986259] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 479.995989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 480.006289] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 480.012699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 480.019818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 480.034637] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 480.045097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 480.430471] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:16 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x800) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) ioctl(r0, 0x10000, &(0x7f0000000340)="11b31548bde39ea328f070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) write$P9_RLERROR(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="5f00000007010056007365637572697479706f7387ce4960cd3269785f61636c5f61636365737373656375726974795e706f6969785f61636c5f616363657373766d6e6574306b657972696e67766d6e65743062646576ca6e6f92d17673656d476e75787d"], 0x5f) 23:42:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:42:16 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000300)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x18880, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000080)=0xbc, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x41c1, 0x8000000000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000300)=""/84, &(0x7f0000000380)=0x54) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:17 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:17 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f0000000300)="11dca50d5e0bcfe47bf07017dfad92c346839de395c6f0b95890625d0f02be16f82bcb3974fc63ca8efced229fe0a90a1047fe37b14c218436cea63d27446caea4d08dc50d718e5d2eb8531ff12eca8429697effe97be3615a940cc334e5431b92459348390fb673ab91042f2acead663d3a634cdfa9d0ad19ef429c0deb632b352f25356f9610b7fc097dc7") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e23, @rand_addr=0x400}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 481.561306] IPVS: length: 84 != 8 [ 481.587687] IPVS: length: 84 != 8 23:42:17 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000080)=0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:17 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000300)=""/223) 23:42:17 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:17 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:17 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800001000008915, &(0x7f00000005c0)="11dca50d810000007bf0709c9615179c859c152de8508c9547b509455fbda1555eabbfc282c972082cb49dd3cd6e752aaad9e86642824478ea509d07c74f15a289d001abb16faa2187000000000000000686b0c5e6c0f6f4f6e48614f3f4ea21bbce4d3578fac8d03c143b91b8061c8e7e8e5734706b663f48b6292cc44d6a29df464b18a810076e1fde557bf166279ce335a2f1d422e9eec6d341ff548ac84da781375eac4a73e5245fe91f398a2018262cbbdd737429184cbf58f3f44fb2df9799a608dd33710286de7f6d1ad4c618129ae36e29ae501006a3583ff3837ea940f752fcbae3c5a2457b28e614dc5d57f4fd5b62470436e625b4dd86bc3f928dee171b18679adf78e4b4c490048eb8d11ec6ad68426ff5f0c7740feea85e946ca3ae48bfa5ce3ae385d3fa20324f68c9dd31f46f5a9405c086e21d5bbddd06f7ab0a87d32e31a4215247e347a577eee110168f77f29f940bc9a1ebc6744dd8920332ab0476ee6dfabe2cf6ab411873b1105c5bfefe405f76fbb72847123fb8d9657536e660ef041610e5b6b062e6db23d04fc40a9812ecbb3f03b40e") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200000) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x200) renameat2(r2, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x8040, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000680)) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000440)=[0xee00, 0xee00, 0xffffffffffffffff]) fchown(r1, r3, r5) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x5, 0x240) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f803d5a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673761a0000add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xfffffffffffffe61) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000340)={0x10}) r8 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffffffd, 0x200400) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000f5564db7187f3236fccab060610323f75edc952276a1a2d5fde5366ded43dc552eeb2ea12fe02546e4fbff1188ccf4440f805b81b38bfc7971ab07c1f803d0217909fc0732ceb3594b34a7957ac0dd8782d3bd9956c49e98ea4440f666b578a5c0f4e189133e4a"], &(0x7f0000000300)=0xa) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x4}, [{0x2, 0x7, r3}, {0x2, 0x5, r3}, {0x2, 0x4, r3}, {0x2, 0x2, r3}, {0x2, 0x0, r3}, {0x2, 0x1, r3}, {0x2, 0x5, r3}], {0x4, 0x4}, [{0x8, 0x3, r6}, {0x8, 0x4, r7}, {0x8, 0x1, r4}, {0x8, 0x7, r5}, {0x8, 0x4, r5}, {0x8, 0x2, r4}], {0x10, 0x3}, {0x20, 0x1}}, 0x8c, 0x0) 23:42:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000600)={0x20, 0x0, 'client0\x00', 0x4, "31a76ef0cd06f131", "a3793f4f8430dfee882570e28f167d3410567d1b1ca41b684fc6726d540f0f6d", 0x8000, 0x6}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000300)={0x95, 0x4, 0x8002, 0x1, 0x8001, 0x8000, 0x80, 0x2, 0x0}, &(0x7f0000000340)=0x20) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000500)={r3, 0x7ff}, &(0x7f0000000540)=0x8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r4 = dup(r0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000006c0)={0xfffffffffffffd05, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="076304400100000007620440000000000863104003000000000000000000000000000000046304721800000004630440010000000f630c40000000000000000000000000d463b54999765e91a8fb727a77458ced7d8032fb00a57afff0103427c54013302ab5b107fe29f58e17059336b29e648c92303ebfa8ad70c3af3a4dd5c12c28d4e096f693f9e4a58273687de152dcbcdfa88ac920198bc4507a53c0a5c102976e1d397007d969bf1981186c2e6bda9dd28431bfbb94ac74a7ca42a70faab1edbcea"], 0x7b, 0x0, &(0x7f0000000380)="f9a76742f8cb23f56c900690774af16356407ab80057a3d64be8646d4f5fb86ac756fbe7cbe27a8b54caee79a218b566236541d5c274d562d96b8486033ef83f9570edd77c74a8232078716354c246f00cab717a0d67250543d82bf2266ce51b12730a0fec144637c9b57718de92be2c6d6a1430b9b24ee3f2f4b3"}) accept4$inet6(r1, &(0x7f0000000580)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000005c0)=0x1c, 0x80800) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:17 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:17 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 482.311082] device bridge_slave_1 left promiscuous mode [ 482.316629] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.323465] protocol 88fb is buggy, dev hsr_slave_0 [ 482.328549] protocol 88fb is buggy, dev hsr_slave_1 [ 482.471127] device bridge_slave_0 left promiscuous mode [ 482.476654] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.753225] device hsr_slave_1 left promiscuous mode [ 482.813801] device hsr_slave_0 left promiscuous mode [ 482.856300] team0 (unregistering): Port device team_slave_1 removed [ 482.872863] team0 (unregistering): Port device team_slave_0 removed [ 482.893295] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 482.956377] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 483.036537] bond0 (unregistering): Released all slaves [ 484.900840] IPVS: ftp: loaded support on port[0] = 21 [ 485.714367] chnl_net:caif_netlink_parms(): no params data found [ 485.749600] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.756250] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.763297] device bridge_slave_0 entered promiscuous mode [ 485.769898] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.776348] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.783684] device bridge_slave_1 entered promiscuous mode [ 485.801639] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 485.810580] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 485.828217] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 485.835537] team0: Port device team_slave_0 added [ 485.841323] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 485.848345] team0: Port device team_slave_1 added [ 485.853685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 485.861016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 485.942310] device hsr_slave_0 entered promiscuous mode [ 486.010489] device hsr_slave_1 entered promiscuous mode [ 486.060605] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 486.067444] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 486.079985] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.086366] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.093021] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.099369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.129548] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 486.136097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 486.144335] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 486.154110] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 486.161522] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.168145] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.178643] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 486.184793] 8021q: adding VLAN 0 to HW filter on device team0 [ 486.194453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 486.202091] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.208435] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.221443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 486.228958] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.235336] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.253710] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 486.263659] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 486.273894] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 486.281082] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 486.288781] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 486.296403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 486.305218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 486.313429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 486.320450] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 486.333248] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 486.345032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 486.700597] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4600, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000200)) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000500)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea319977b90577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0x8f635e990a2ca024) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000400)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cf8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801aacbcdadec355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) delete_module(&(0x7f00000001c0)='\xc6\x00', 0xa00) 23:42:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10080000001, &(0x7f0000000300)="11dca50d5e0bcfe47bf0709ebf97653e490b1131db25e76e8ce05a3f701a1cd50edcd78ae76d1364d9b6ae4e3c186513279d99c49e79da4221de456be03093eb6ff7c42599b7989b967d8eb7b0f12120575901c3c3d7f7dc94e0f75871a45b6c2f1ccb3af251d90951ddc5c084999c618f0c34c1c2b4101bcd") r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:23 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:23 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:23 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x2, &(0x7f0000000000)="fe74765888cf8d19300aaabd8648b35d5a7f518af4ff46b3feec6bcb") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r3 = getuid() accept4(r1, &(0x7f00000004c0)=@hci={0x1f, 0x0}, &(0x7f0000000540)=0x80, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000580)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000680)=0xe8) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000080), 0xc, &(0x7f0000000880)={&(0x7f00000006c0)=@can_newroute={0x194, 0x18, 0x20, 0x70bd2c, 0x25dfdbfe, {0x1d, 0x1, 0x5}, [@CGW_MOD_UID={0x8, 0xe, r3}, @CGW_CS_XOR={0x8, 0x5, {0xfffffffffffffffe, 0x0, 0x7, 0x80000000}}, @CGW_CS_XOR={0x8, 0x5, {0x7, 0x8, 0xfffffffffffffffe, 0xffffffff}}, @CGW_CS_CRC8={0x120, 0x6, {0x52, 0x7e, 0x10, 0x9, 0x8, "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", 0x0, "e267bcbbdf1f013046136a9a9191d81ef4ed3756"}}, @CGW_CS_XOR={0x8, 0x5, {0x8, 0x5, 0x5, 0x8001}}, @CGW_DST_IF={0x8, 0xa, r4}, @CGW_MOD_SET={0x18, 0x4, {{{0x0, 0x0, 0xffffffffffffff00, 0x3f}, 0x2, 0x0, 0x0, 0x0, "d8c0c3c8fe55e8fa"}, 0x4}}, @CGW_MOD_SET={0x18, 0x4, {{{0x1, 0x7, 0x400, 0x1}, 0x3, 0x3, 0x0, 0x0, "c98a857771f5461c"}, 0x3}}, @CGW_MOD_UID={0x8, 0xe, r5}]}, 0x194}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) 23:42:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000300)={0x0, @reserved}) 23:42:23 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x6000) accept4$rose(r1, &(0x7f0000000080)=@full={0xb, @remote, @null, 0x0, [@remote, @remote, @null, @netrom, @default, @null]}, &(0x7f0000000300)=0x40, 0x80000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e21, @broadcast}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0x52) ioctl$FS_IOC_GETFLAGS(r3, 0x80086601, &(0x7f0000000340)) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0x2eb) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f00000004c0), &(0x7f0000000380)=0xb) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000500)={0x7b, 0x0, [0x5, 0x101, 0x7, 0x5]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x500, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000440)='trusted.overlay.origin\x00', &(0x7f0000000480)='y\x00', 0x2, 0x1) 23:42:23 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:23 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r1, 0x36}}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000140)={0x0, 0xfffffffffffffffd, 0x0, 0x5, 0x6, 0x7, 0x5, 0x6, {0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x40, 0x2, 0x3, 0x4, 0xffffffffffffff80}}, &(0x7f00000004c0)=0xb0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000500)={r3, @in={{0x2, 0x4e24, @remote}}}, 0x84) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:23 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e22, @local}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000480)=@xdp, &(0x7f0000000500)=0x80, 0x80800) connect$vsock_dgram(r1, &(0x7f0000000540)={0x28, 0x0, 0x2710, @host}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x4e24, @rand_addr=0x1}}, 0x0, 0x5, 0x0, "0357680e76a4bc8bb7beaaf347aea382dc3db3f635d3e942bf2851aaddd8c394d5046ac4dea287d0bb28e82a32ae810bc329f3031c2b70f2ca0b07de7a7c8cf90966b69158cc92a9a5c0dd05a22860b2"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r3 = gettid() r4 = syz_open_dev$vbi(&(0x7f0000000400)='/dev/vbi#\x00', 0x3, 0x2) bind$rds(r4, &(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10) timer_create(0x7, &(0x7f0000000000)={0x0, 0x2b, 0x0, @tid=r3}, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:23 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:23 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$setsig(r0, 0xa, 0x34) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x109000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080)=0x7c6, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x100000001) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:23 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:24 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:24 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'syzkaller1\x00', 0x0}) bind$bt_hci(r2, &(0x7f0000000300)={0x1f, r3, 0x3}, 0xc) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000340)={"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"}) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r2 = msgget(0x0, 0x200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f00000003c0)=""/4096) msgrcv(r2, &(0x7f0000000300)={0x0, ""/112}, 0x35, 0x2, 0x2000) accept$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) [ 488.711334] device bridge_slave_1 left promiscuous mode [ 488.718228] bridge0: port 2(bridge_slave_1) entered disabled state [ 488.750808] device bridge_slave_0 left promiscuous mode [ 488.780690] bridge0: port 1(bridge_slave_0) entered disabled state [ 488.800275] protocol 88fb is buggy, dev hsr_slave_0 [ 488.805361] protocol 88fb is buggy, dev hsr_slave_1 [ 489.016183] device hsr_slave_1 left promiscuous mode [ 489.038855] device hsr_slave_0 left promiscuous mode [ 489.059650] team0 (unregistering): Port device team_slave_1 removed [ 489.086997] team0 (unregistering): Port device team_slave_0 removed [ 489.111963] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 489.125108] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 489.203899] bond0 (unregistering): Released all slaves [ 490.900855] IPVS: ftp: loaded support on port[0] = 21 [ 491.812053] chnl_net:caif_netlink_parms(): no params data found [ 491.849229] bridge0: port 1(bridge_slave_0) entered blocking state [ 491.855716] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.863021] device bridge_slave_0 entered promiscuous mode [ 491.869588] bridge0: port 2(bridge_slave_1) entered blocking state [ 491.876127] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.883714] device bridge_slave_1 entered promiscuous mode [ 491.900486] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 491.909252] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 491.928709] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 491.936176] team0: Port device team_slave_0 added [ 491.941971] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 491.949015] team0: Port device team_slave_1 added [ 491.954366] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 491.961799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 492.024079] device hsr_slave_0 entered promiscuous mode [ 492.080413] device hsr_slave_1 entered promiscuous mode [ 492.120700] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 492.127547] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 492.142351] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.148844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.155509] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.161945] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.191701] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 492.197777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 492.205813] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 492.214868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 492.223070] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.229664] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.239125] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 492.245430] 8021q: adding VLAN 0 to HW filter on device team0 [ 492.255426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 492.263127] bridge0: port 1(bridge_slave_0) entered blocking state [ 492.269476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 492.279023] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 492.286800] bridge0: port 2(bridge_slave_1) entered blocking state [ 492.293194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 492.310913] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 492.318579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 492.326459] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 492.338949] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 492.349846] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 492.361973] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 492.368263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 492.375919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 492.383523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 492.396626] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 492.407038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 492.800628] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:29 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:29 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:29 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:29 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000880)='/dev/input/mice\x00', 0x0, 0x400) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000300)) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f00000008c0)=0x3, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000340)) 23:42:29 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000300)="11dca50d5e0bcfe47bf070d007633ab34b8b28cf793bf412c0300ea1512564952316d39500f09ddc74f2328fc84c6f5a78f0e963816497c5959388e6c087b053e842302f4390bd2952308744d80f5d3cc88239") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:29 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, 0x0, 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:29 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:29 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:29 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x1, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x8, 0x4}, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x10, 0x2, 0x3}, &(0x7f0000000340)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0x2748}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=r2, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001a00)={r0}) ioctl$SIOCAX25ADDFWD(r3, 0x89ea, &(0x7f0000001a40)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x50000, 0x0) ioctl$KVM_SET_PIT(r4, 0x8048ae66, &(0x7f0000000540)={[{0xffff, 0x8, 0x1, 0x80, 0x101, 0x6, 0x3, 0x0, 0x7, 0x1, 0x100000001, 0x2e8f, 0x1912}, {0x3ff, 0x0, 0x2, 0x8c2, 0x662, 0xc0000000, 0x7ff, 0x8, 0x6, 0x1f, 0x4, 0x6, 0xea}, {0x3, 0x0, 0x20, 0x56, 0x2, 0x401, 0x10000, 0x3f, 0x4, 0x9, 0x2, 0x1ff, 0x90}], 0x2}) 23:42:29 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:29 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200400, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0xffffffff00000000, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0x19) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 494.000159] protocol 88fb is buggy, dev hsr_slave_0 [ 494.005313] protocol 88fb is buggy, dev hsr_slave_1 23:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:29 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) [ 494.651168] device bridge_slave_1 left promiscuous mode [ 494.656698] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.710913] device bridge_slave_0 left promiscuous mode [ 494.720691] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.883543] device hsr_slave_1 left promiscuous mode [ 494.963839] device hsr_slave_0 left promiscuous mode [ 495.022895] team0 (unregistering): Port device team_slave_1 removed [ 495.034884] team0 (unregistering): Port device team_slave_0 removed [ 495.044563] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 495.133204] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 495.196254] bond0 (unregistering): Released all slaves [ 496.971507] IPVS: ftp: loaded support on port[0] = 21 [ 497.816356] chnl_net:caif_netlink_parms(): no params data found [ 497.851164] bridge0: port 1(bridge_slave_0) entered blocking state [ 497.857623] bridge0: port 1(bridge_slave_0) entered disabled state [ 497.864700] device bridge_slave_0 entered promiscuous mode [ 497.871635] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.878000] bridge0: port 2(bridge_slave_1) entered disabled state [ 497.885451] device bridge_slave_1 entered promiscuous mode [ 497.902349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 497.911333] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 497.931605] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 497.938650] team0: Port device team_slave_0 added [ 497.944201] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 497.951537] team0: Port device team_slave_1 added [ 497.956695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 497.964051] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 498.012336] device hsr_slave_0 entered promiscuous mode [ 498.050422] device hsr_slave_1 entered promiscuous mode [ 498.110536] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 498.117386] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 498.129965] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.136359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.143040] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.149381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.178767] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 498.185241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 498.194093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 498.203169] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 498.210532] bridge0: port 1(bridge_slave_0) entered disabled state [ 498.217311] bridge0: port 2(bridge_slave_1) entered disabled state [ 498.226711] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 498.232902] 8021q: adding VLAN 0 to HW filter on device team0 [ 498.241477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 498.249596] bridge0: port 1(bridge_slave_0) entered blocking state [ 498.256002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 498.266332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 498.274238] bridge0: port 2(bridge_slave_1) entered blocking state [ 498.280631] bridge0: port 2(bridge_slave_1) entered forwarding state [ 498.294686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 498.302606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 498.312728] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 498.327966] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 498.338020] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 498.350879] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 498.357784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 498.365578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 498.373226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 498.387498] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 498.397710] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 498.801427] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:34 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:34 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:34 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000000300)={0x5, 0x8, 0x3, 0x401}, &(0x7f0000000340)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r0, 0x4) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:34 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:34 executing program 4: r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa, r0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x2}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:35 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:35 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'nlmon0\x00', {0x2, 0x4e23, @loopback}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/vsock\x00', 0x42000, 0x0) sendmsg$key(r1, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f0000001a80)={0x2, 0x6, 0x7, 0x6, 0x4, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_ident={0x2, 0xa, 0x0, 0x0, 0x4}]}, 0x20}}, 0x880) ioctl$IMCTRLREQ(r1, 0x80044945, &(0x7f0000000080)={0x800, 0x4, 0x0, 0x1d18}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:35 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:35 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 499.743143] Unknown ioctl -2147202747 23:42:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) [ 499.896857] Unknown ioctl -2147202747 23:42:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:35 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:35 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@initdev, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:42:35 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 500.310446] device bridge_slave_1 left promiscuous mode [ 500.315968] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.390843] device bridge_slave_0 left promiscuous mode [ 500.396341] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.622332] device hsr_slave_1 left promiscuous mode [ 500.674450] device hsr_slave_0 left promiscuous mode [ 500.733931] team0 (unregistering): Port device team_slave_1 removed [ 500.754456] team0 (unregistering): Port device team_slave_0 removed [ 500.772875] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 500.814288] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 500.896121] bond0 (unregistering): Released all slaves [ 502.791391] IPVS: ftp: loaded support on port[0] = 21 [ 503.705148] chnl_net:caif_netlink_parms(): no params data found [ 503.741721] bridge0: port 1(bridge_slave_0) entered blocking state [ 503.748143] bridge0: port 1(bridge_slave_0) entered disabled state [ 503.755252] device bridge_slave_0 entered promiscuous mode [ 503.762481] bridge0: port 2(bridge_slave_1) entered blocking state [ 503.768858] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.775966] device bridge_slave_1 entered promiscuous mode [ 503.794466] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 503.803824] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 503.820415] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 503.827507] team0: Port device team_slave_0 added [ 503.833039] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 503.840180] team0: Port device team_slave_1 added [ 503.845558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 503.853023] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 503.912631] device hsr_slave_0 entered promiscuous mode [ 503.950411] device hsr_slave_1 entered promiscuous mode [ 503.990686] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 503.997602] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 504.011350] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.017701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.024382] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.030777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.059630] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 504.065942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 504.074127] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 504.083802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 504.091566] bridge0: port 1(bridge_slave_0) entered disabled state [ 504.098203] bridge0: port 2(bridge_slave_1) entered disabled state [ 504.108169] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 504.114324] 8021q: adding VLAN 0 to HW filter on device team0 [ 504.124737] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 504.132299] bridge0: port 1(bridge_slave_0) entered blocking state [ 504.138627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 504.147950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 504.155753] bridge0: port 2(bridge_slave_1) entered blocking state [ 504.162146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 504.178414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 504.186246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 504.195827] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 504.209497] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 504.219343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 504.231608] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 504.237609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 504.253156] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 504.263519] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 504.690623] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5a0000000000003, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000540)={&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000500)=""/49, 0x31}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) r4 = fcntl$getown(r3, 0x9) get_robust_list(r4, &(0x7f0000000400)=&(0x7f00000003c0), &(0x7f0000000440)=0x18) r5 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x200000) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000300)={{0x6, 0x3}, 'port1\x00', 0x43, 0x40c08, 0xce08, 0x3, 0xf936, 0xfddf, 0x3f, 0x0, 0x1}) 23:42:41 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:41 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:42:41 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x0, 0x8}, 0x10) 23:42:41 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:41 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x40000000000003, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x0, 0x0, 0x0, "a3ee11e216e92c860b64754184a9c02e1d7dfd0aab15fadc194c09d7f67e129db1a1b166f90b5f63955dbbbd04f8263da8509eec270067bd44d61764e34a4d"}, 0x60) 23:42:41 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) [ 506.580399] device bridge_slave_1 left promiscuous mode [ 506.585929] bridge0: port 2(bridge_slave_1) entered disabled state [ 506.640946] device bridge_slave_0 left promiscuous mode [ 506.646449] bridge0: port 1(bridge_slave_0) entered disabled state [ 506.763845] device hsr_slave_1 left promiscuous mode [ 506.812798] device hsr_slave_0 left promiscuous mode [ 506.872968] team0 (unregistering): Port device team_slave_1 removed [ 506.885007] team0 (unregistering): Port device team_slave_0 removed [ 506.894439] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 506.923437] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 506.998520] bond0 (unregistering): Released all slaves [ 508.794196] IPVS: ftp: loaded support on port[0] = 21 [ 509.693668] chnl_net:caif_netlink_parms(): no params data found [ 509.731712] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.738094] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.745297] device bridge_slave_0 entered promiscuous mode [ 509.752669] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.759074] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.766187] device bridge_slave_1 entered promiscuous mode [ 509.783775] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 509.792721] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 509.809075] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 509.816375] team0: Port device team_slave_0 added [ 509.821818] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 509.828857] team0: Port device team_slave_1 added [ 509.834279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 509.841501] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 509.924794] device hsr_slave_0 entered promiscuous mode [ 509.980454] device hsr_slave_1 entered promiscuous mode [ 510.030559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 510.037395] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 510.051332] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.057660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.064331] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.070715] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.107148] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 510.114255] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.123362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 510.132173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.139659] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.146475] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.155806] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 510.162090] 8021q: adding VLAN 0 to HW filter on device team0 [ 510.170993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.178550] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.184956] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.201619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.209168] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.215594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.233933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 510.242171] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 510.253487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 510.265512] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 510.275570] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 510.285868] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 510.292707] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 510.300822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.312852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 510.326844] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 510.336999] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 510.660427] IPVS: stopping backup sync thread 10749 ... [ 510.666215] device bridge_slave_1 left promiscuous mode [ 510.672483] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.710917] device bridge_slave_0 left promiscuous mode [ 510.716466] bridge0: port 1(bridge_slave_0) entered disabled state 23:42:46 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:46 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="8700fb08000000faffff0100000000009500000000000000cc06f1c793aeffb9b82b4181320d9c613df791f012619c7ac1d7eb1d687ca4ad1b2f786edcf3a3df692de8d6db76d32b061e03bd0d913d56e32a6095fd81d62229f40d2089dfbd812cb3b5e7e7d7c804c6350809c228ca3a019ba832d878"], &(0x7f0000000180)='GPL\x00'}, 0x48) 23:42:46 executing program 2: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000001}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x20000}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000004c0)=@ccm_128={{0x307}, "7078d1df6c2ad466", "06700b50ef98f8213e79acb664a9825a", "83ced165", "a08685e04022a4c9"}, 0x28) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) ioprio_get$uid(0x3, r3) socket$inet_udp(0x2, 0x2, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000280)={'U-', 0x8}, 0x63c, 0x1) socket$inet_udp(0x2, 0x2, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r1) ioctl$PPPIOCDISCONN(r4, 0x7439) bind$inet6(r5, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000480)={0x9, 0x5, 0x4}) sendto$inet6(r5, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="7f454cf2deda40729b25fb0000000000004000588171000008000055c4af96311d39962100001600380001000900ff030100029ebd6ce1afd40e4ec61030cf4b0794000000094baa1014256024989fb0daa1e1dc3a7d03463851928c68c9ffe59594233c796be7a99e4c75ecb2d3b988779663c376cc5b11e0400ef69a0d0c8a195b53a10000008164d810e7d64ea463c66f2160aa2f34694decda23b6d7badba63de91bdd024bec7cf34ac962e54ec3223009d40aac51742ff7d807142074f3f3b1da8950138a35761568e5c668f6c25058c26fe16f22ff45c7b54e061bc29d02eba0f392d9062561a800000000000000000000000000000011e2f7b21ef8c9837a00969851739d843727ff2453c8f74acfed3cbb61f2f3a425ecb63369e0800b454ced7baa3593135ef3562e43dac7551cd1fb6cb5ec8fe1db90a59d575f26cd7298d942909d1ac3a0"], 0x119) setsockopt$inet6_tcp_int(r6, 0x6, 0x3, &(0x7f0000000000)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0x40a85323, &(0x7f0000000180)={{0x6, 0x8}, 'port1\x00', 0x49, 0x40, 0x3ff, 0x2, 0x6, 0x67d, 0x1, 0x0, 0x7, 0x3f}) recvmmsg(r5, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000500)=""/154) 23:42:46 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:42:46 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:46 executing program 4: poll(&(0x7f0000000000), 0x2000000000000017, 0x57) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd1b, 0x0, 0x0, 0x800e00505) recvmsg(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001f00)=[{0x0}, {0x0}, {&(0x7f0000001cc0)=""/252, 0xfc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8}, 0x0) shutdown(r0, 0x0) 23:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:42:46 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) 23:42:46 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 510.973115] device hsr_slave_1 left promiscuous mode 23:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) [ 511.053256] device hsr_slave_0 left promiscuous mode [ 511.136814] team0 (unregistering): Port device team_slave_1 removed [ 511.165466] team0 (unregistering): Port device team_slave_0 removed [ 511.185101] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 511.256473] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 511.305771] bond0 (unregistering): Released all slaves [ 511.365335] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:47 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) 23:42:47 executing program 4: sched_setaffinity(0x0, 0xffffffffffffff26, &(0x7f0000000140)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000200)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000100)=0x8000000000000002, 0x4) sendmmsg(r0, &(0x7f0000002580)=[{{&(0x7f0000000140)=@hci, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000880)}}, {{&(0x7f0000000400)=@sco, 0x359, &(0x7f0000000a80), 0x26c, &(0x7f0000000c40)}}], 0x4000000000002f0, 0x0) 23:42:47 executing program 2: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x100000000000001}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)={0x20000}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000004c0)=@ccm_128={{0x307}, "7078d1df6c2ad466", "06700b50ef98f8213e79acb664a9825a", "83ced165", "a08685e04022a4c9"}, 0x28) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) ioprio_get$uid(0x3, r3) socket$inet_udp(0x2, 0x2, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000280)={'U-', 0x8}, 0x63c, 0x1) socket$inet_udp(0x2, 0x2, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r1) ioctl$PPPIOCDISCONN(r4, 0x7439) bind$inet6(r5, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000480)={0x9, 0x5, 0x4}) sendto$inet6(r5, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x119) setsockopt$inet6_tcp_int(r6, 0x6, 0x3, &(0x7f0000000000)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r6, 0x40a85323, &(0x7f0000000180)={{0x6, 0x8}, 'port1\x00', 0x49, 0x40, 0x3ff, 0x2, 0x6, 0x67d, 0x1, 0x0, 0x7, 0x3f}) recvmmsg(r5, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f00000002c0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0x10, r0) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000500)=""/154) 23:42:47 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000800)=ANY=[@ANYBLOB="0c3e0f05"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xa) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:42:47 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000240)="390000001300090069fdffffffffffffaa00804803000000460001070000001419002b0000001000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 23:42:47 executing program 1: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:42:47 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 511.854432] netlink: 21 bytes leftover after parsing attributes in process `syz-executor.4'. 23:42:47 executing program 2: syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write(r1, 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 23:42:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x5411, 0x0) 23:42:47 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:47 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x5411, 0x0) 23:42:47 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x5411, 0x0) [ 514.281416] IPVS: ftp: loaded support on port[0] = 21 [ 515.099854] chnl_net:caif_netlink_parms(): no params data found [ 515.144535] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.151031] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.158035] device bridge_slave_0 entered promiscuous mode [ 515.165428] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.171921] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.179031] device bridge_slave_1 entered promiscuous mode [ 515.199005] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 515.215946] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 515.243964] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 515.251247] team0: Port device team_slave_0 added [ 515.256554] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 515.263846] team0: Port device team_slave_1 added [ 515.269130] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 515.276513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 515.353408] device hsr_slave_0 entered promiscuous mode [ 515.390327] device hsr_slave_1 entered promiscuous mode [ 515.430602] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 515.441113] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 515.453382] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.459729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.466383] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.472750] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.508113] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 515.514598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 515.525386] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 515.535530] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 515.542670] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.549265] bridge0: port 2(bridge_slave_1) entered disabled state [ 515.559974] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 515.566257] 8021q: adding VLAN 0 to HW filter on device team0 [ 515.581033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 515.588594] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.595079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.612511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 515.620509] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.626857] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.634287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 515.643284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 515.651046] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 515.665189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 515.676200] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 515.687177] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 515.694093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 515.703636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 515.718081] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 515.727530] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 515.830707] device bridge_slave_1 left promiscuous mode [ 515.836260] bridge0: port 2(bridge_slave_1) entered disabled state 23:42:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:51 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 515.892203] device bridge_slave_0 left promiscuous mode [ 515.897722] bridge0: port 1(bridge_slave_0) entered disabled state 23:42:51 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25DELFWD(r1, 0x5411, 0x0) 23:42:51 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:51 executing program 2: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:51 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:51 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, 0x0, &(0x7f0000000040)) [ 515.977176] overlayfs: empty lowerdir [ 515.993137] overlayfs: empty lowerdir [ 516.067086] overlayfs: empty lowerdir [ 516.084374] device hsr_slave_1 left promiscuous mode 23:42:51 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:51 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, 0x0, &(0x7f0000000040)) [ 516.152525] device hsr_slave_0 left promiscuous mode [ 516.170522] protocol 88fb is buggy, dev hsr_slave_0 [ 516.176130] protocol 88fb is buggy, dev hsr_slave_1 23:42:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 516.235684] team0 (unregistering): Port device team_slave_1 removed [ 516.261411] overlayfs: empty lowerdir [ 516.277247] team0 (unregistering): Port device team_slave_0 removed [ 516.668731] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 516.734531] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 516.808339] bond0 (unregistering): Released all slaves [ 516.891349] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:42:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:52 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:52 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:52 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, 0x0, &(0x7f0000000040)) 23:42:52 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, 0x0, &(0x7f0000000040)) 23:42:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:52 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 516.986603] overlayfs: empty lowerdir 23:42:52 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:52 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:52 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, 0x0, &(0x7f0000000040)) 23:42:52 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)) 23:42:52 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:52 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:52 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:42:52 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], &(0x7f0000000040)) 23:42:52 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) [ 517.428510] overlayfs: empty lowerdir 23:42:53 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 517.599595] overlayfs: empty lowerdir [ 517.680384] protocol 88fb is buggy, dev hsr_slave_0 [ 517.685479] protocol 88fb is buggy, dev hsr_slave_1 [ 519.841741] IPVS: ftp: loaded support on port[0] = 21 [ 520.808297] chnl_net:caif_netlink_parms(): no params data found [ 520.854534] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.861126] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.868131] device bridge_slave_0 entered promiscuous mode [ 520.875480] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.882395] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.889586] device bridge_slave_1 entered promiscuous mode [ 520.908756] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 520.917834] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 520.944889] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 520.952270] team0: Port device team_slave_0 added [ 520.957576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 520.965247] team0: Port device team_slave_1 added [ 520.970587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 520.977906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 521.034342] device hsr_slave_0 entered promiscuous mode [ 521.070384] device hsr_slave_1 entered promiscuous mode [ 521.110701] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 521.122741] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 521.136073] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.142429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.148987] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.155364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.186222] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 521.193519] 8021q: adding VLAN 0 to HW filter on device bond0 [ 521.205564] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 521.214576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 521.222138] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.228733] bridge0: port 2(bridge_slave_1) entered disabled state [ 521.238678] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 521.245090] 8021q: adding VLAN 0 to HW filter on device team0 [ 521.257336] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 521.265204] bridge0: port 1(bridge_slave_0) entered blocking state [ 521.271592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 521.283213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 521.291233] bridge0: port 2(bridge_slave_1) entered blocking state [ 521.297605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 521.321633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 521.329302] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 521.337624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 521.345135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 521.358783] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 521.365101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 521.372238] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 521.387948] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 521.397460] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 521.570346] device bridge_slave_1 left promiscuous mode [ 521.575833] bridge0: port 2(bridge_slave_1) entered disabled state 23:42:57 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:57 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) 23:42:57 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:42:57 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:42:57 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x0, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 521.631937] device bridge_slave_0 left promiscuous mode [ 521.637458] bridge0: port 1(bridge_slave_0) entered disabled state [ 521.717891] overlayfs: empty lowerdir [ 521.850137] protocol 88fb is buggy, dev hsr_slave_0 [ 521.860884] device hsr_slave_1 left promiscuous mode [ 521.914481] device hsr_slave_0 left promiscuous mode [ 521.955816] team0 (unregistering): Port device team_slave_1 removed [ 521.965835] team0 (unregistering): Port device team_slave_0 removed [ 521.976394] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 522.016178] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 522.086268] bond0 (unregistering): Released all slaves [ 522.129470] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 523.741420] IPVS: ftp: loaded support on port[0] = 21 [ 524.815320] chnl_net:caif_netlink_parms(): no params data found [ 524.862299] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.868706] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.876233] device bridge_slave_0 entered promiscuous mode [ 524.887741] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.894179] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.902214] device bridge_slave_1 entered promiscuous mode [ 524.918272] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 524.927400] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 524.954361] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 524.961654] team0: Port device team_slave_0 added [ 524.967052] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 524.974417] team0: Port device team_slave_1 added [ 524.979611] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 524.986968] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 525.054068] device hsr_slave_0 entered promiscuous mode [ 525.110387] device hsr_slave_1 entered promiscuous mode [ 525.150648] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 525.159998] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 525.173309] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.179649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.186295] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.192684] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.227412] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 525.233728] 8021q: adding VLAN 0 to HW filter on device bond0 [ 525.242970] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 525.251525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 525.258624] bridge0: port 1(bridge_slave_0) entered disabled state [ 525.266644] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.279172] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 525.286505] 8021q: adding VLAN 0 to HW filter on device team0 [ 525.295849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 525.303461] bridge0: port 1(bridge_slave_0) entered blocking state [ 525.309784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 525.330774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 525.338317] bridge0: port 2(bridge_slave_1) entered blocking state [ 525.344731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 525.353229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 525.362737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 525.369659] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 525.385956] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 525.397361] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 525.408617] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 525.415176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 525.423422] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 525.438199] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 525.449189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 525.510820] device bridge_slave_1 left promiscuous mode [ 525.516348] bridge0: port 2(bridge_slave_1) entered disabled state [ 525.560943] device bridge_slave_0 left promiscuous mode [ 525.566444] bridge0: port 1(bridge_slave_0) entered disabled state 23:43:01 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x0, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:01 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:01 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) 23:43:01 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:43:01 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x0, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:01 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:01 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 525.678221] overlayfs: empty lowerdir 23:43:01 executing program 0: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) [ 525.734871] device hsr_slave_1 left promiscuous mode 23:43:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 525.786594] device hsr_slave_0 left promiscuous mode [ 525.821812] overlayfs: empty lowerdir 23:43:01 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 525.864235] team0 (unregistering): Port device team_slave_1 removed [ 525.870848] protocol 88fb is buggy, dev hsr_slave_0 [ 525.870912] protocol 88fb is buggy, dev hsr_slave_1 23:43:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 526.000129] protocol 88fb is buggy, dev hsr_slave_0 [ 526.005224] protocol 88fb is buggy, dev hsr_slave_1 [ 526.020246] overlayfs: empty lowerdir 23:43:01 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 526.119630] team0 (unregistering): Port device team_slave_0 removed [ 526.152237] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 526.304586] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 526.417852] bond0 (unregistering): Released all slaves [ 526.483616] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:43:02 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x0, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:02 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:43:02 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:43:02 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x0, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 526.800431] protocol 88fb is buggy, dev hsr_slave_0 [ 526.805875] protocol 88fb is buggy, dev hsr_slave_1 [ 526.810144] protocol 88fb is buggy, dev hsr_slave_0 [ 526.815992] protocol 88fb is buggy, dev hsr_slave_1 [ 529.051406] IPVS: ftp: loaded support on port[0] = 21 [ 529.916254] IPVS: ftp: loaded support on port[0] = 21 [ 529.968371] chnl_net:caif_netlink_parms(): no params data found [ 530.046016] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.052575] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.059427] device bridge_slave_0 entered promiscuous mode [ 530.066456] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.072891] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.079743] device bridge_slave_1 entered promiscuous mode [ 530.105211] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 530.115197] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 530.156356] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 530.164313] team0: Port device team_slave_0 added [ 530.209486] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 530.216893] team0: Port device team_slave_1 added [ 530.222367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 530.252116] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 530.273454] chnl_net:caif_netlink_parms(): no params data found [ 530.344112] device hsr_slave_0 entered promiscuous mode [ 530.401039] device hsr_slave_1 entered promiscuous mode [ 530.449741] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 530.456846] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 530.497847] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.504223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 530.510882] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.517242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 530.530183] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.536544] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.544422] device bridge_slave_0 entered promiscuous mode [ 530.551290] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.557707] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.564731] device bridge_slave_1 entered promiscuous mode [ 530.591334] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 530.603137] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 530.632409] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 530.639595] team0: Port device team_slave_0 added [ 530.645458] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 530.652769] team0: Port device team_slave_1 added [ 530.658365] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 530.666298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 530.724153] device hsr_slave_0 entered promiscuous mode [ 530.760421] device hsr_slave_1 entered promiscuous mode [ 530.810613] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 530.825332] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 530.842991] bridge0: port 2(bridge_slave_1) entered blocking state [ 530.849348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 530.856011] bridge0: port 1(bridge_slave_0) entered blocking state [ 530.862412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 530.892728] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 530.898785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 530.908487] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 530.919004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 530.926861] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.933704] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.941926] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.948482] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.956430] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 530.965734] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 530.972393] 8021q: adding VLAN 0 to HW filter on device team0 [ 530.987680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 530.995673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 531.003665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 531.011715] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.018060] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.028335] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 531.038314] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 531.049955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 531.058551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 531.066233] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.072603] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.079501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 531.093638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 531.104277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 531.114131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 531.124399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 531.133213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 531.144354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 531.152162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 531.159647] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 531.167795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 531.176568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 531.188643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 531.198687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 531.208971] 8021q: adding VLAN 0 to HW filter on device bond0 [ 531.217833] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 531.226828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 531.234712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 531.248340] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 531.257182] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 531.263571] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 531.274518] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 531.282984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 531.289929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 531.300584] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 531.306664] 8021q: adding VLAN 0 to HW filter on device team0 [ 531.315807] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 531.327994] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 531.338359] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 531.345835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 531.354411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 531.362924] bridge0: port 1(bridge_slave_0) entered blocking state [ 531.369261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 531.376231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 531.384240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 531.391953] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.398308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.408369] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 531.417479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 531.427401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 531.442292] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 531.451032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 531.465348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 531.472273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 531.479927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 531.491096] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 531.507975] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 531.515022] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 531.523199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 531.534154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 531.541150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 531.548603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 531.561986] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 531.568750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 531.576779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 531.586812] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 531.593855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 531.615217] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 531.626644] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 531.742171] device bridge_slave_1 left promiscuous mode [ 531.748319] bridge0: port 2(bridge_slave_1) entered disabled state 23:43:07 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:07 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:07 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:07 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) [ 531.792988] device bridge_slave_0 left promiscuous mode [ 531.798981] bridge0: port 1(bridge_slave_0) entered disabled state 23:43:07 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x0, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:07 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:07 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 532.422578] device hsr_slave_1 left promiscuous mode [ 532.464153] device hsr_slave_0 left promiscuous mode [ 532.504474] team0 (unregistering): Port device team_slave_1 removed [ 532.515278] team0 (unregistering): Port device team_slave_0 removed [ 532.526184] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 532.566065] bond0 (unregistering): Releasing backup interface bond_slave_0 23:43:08 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x0, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 532.699007] bond0 (unregistering): Released all slaves 23:43:08 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:08 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:08 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x0, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:08 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) [ 532.804192] device hsr_slave_1 left promiscuous mode [ 532.867133] device hsr_slave_0 left promiscuous mode [ 532.944169] team0 (unregistering): Port device team_slave_1 removed [ 532.983351] team0 (unregistering): Port device team_slave_0 removed [ 533.028345] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 533.040121] protocol 88fb is buggy, dev hsr_slave_0 [ 533.040727] protocol 88fb is buggy, dev hsr_slave_0 [ 533.045192] protocol 88fb is buggy, dev hsr_slave_1 [ 533.050477] protocol 88fb is buggy, dev hsr_slave_1 [ 533.133642] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 533.215464] bond0 (unregistering): Released all slaves 23:43:08 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:08 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:08 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 535.770948] IPVS: ftp: loaded support on port[0] = 21 [ 536.698332] chnl_net:caif_netlink_parms(): no params data found [ 536.746657] bridge0: port 1(bridge_slave_0) entered blocking state [ 536.754077] bridge0: port 1(bridge_slave_0) entered disabled state [ 536.761380] device bridge_slave_0 entered promiscuous mode [ 536.768130] bridge0: port 2(bridge_slave_1) entered blocking state [ 536.775073] bridge0: port 2(bridge_slave_1) entered disabled state [ 536.782519] device bridge_slave_1 entered promiscuous mode [ 536.799412] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 536.809539] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 536.829452] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 536.837373] team0: Port device team_slave_0 added [ 536.848496] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 536.856717] team0: Port device team_slave_1 added [ 536.862119] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 536.869543] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 536.932377] device hsr_slave_0 entered promiscuous mode [ 537.010383] device hsr_slave_1 entered promiscuous mode [ 537.070721] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 537.077749] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 537.096002] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.102380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.109050] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.115649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.147539] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 537.154753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 537.168107] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 537.176783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 537.186663] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.193741] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.204965] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 537.211696] 8021q: adding VLAN 0 to HW filter on device team0 [ 537.225418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 537.233582] bridge0: port 1(bridge_slave_0) entered blocking state [ 537.240286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 537.250700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 537.258511] bridge0: port 2(bridge_slave_1) entered blocking state [ 537.265178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 537.293168] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 537.301978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 537.309677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 537.317245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 537.325076] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 537.334234] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 537.340641] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 537.355208] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 537.369555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 537.550618] device bridge_slave_1 left promiscuous mode [ 537.556276] bridge0: port 2(bridge_slave_1) entered disabled state 23:43:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0xd, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x989680}, 0x0) 23:43:13 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x0, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:13 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:13 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:13 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) 23:43:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 537.603099] device bridge_slave_0 left promiscuous mode [ 537.608650] bridge0: port 1(bridge_slave_0) entered disabled state 23:43:13 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0:']) 23:43:13 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) 23:43:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 537.865635] overlayfs: missing 'lowerdir' 23:43:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x4, 0x0, &(0x7f0000000040)=[@enter_looper], 0x0, 0x0, 0x0}) poll(&(0x7f0000000200)=[{r1}], 0x1, 0x0) 23:43:13 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) 23:43:13 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, 0x0) [ 537.941271] device hsr_slave_1 left promiscuous mode [ 537.959656] overlayfs: missing 'lowerdir' [ 537.995921] device hsr_slave_0 left promiscuous mode [ 538.044958] overlayfs: missing 'lowerdir' [ 538.066089] team0 (unregistering): Port device team_slave_1 removed [ 538.114666] team0 (unregistering): Port device team_slave_0 removed [ 538.159675] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 538.222430] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 538.431109] bond0 (unregistering): Released all slaves 23:43:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x100000003, 0x3ff, 0x1, 0x2}, 0x1f) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) 23:43:14 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0x0, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 538.518058] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:43:14 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[]) [ 538.646750] overlayfs: missing 'lowerdir' [ 540.671428] IPVS: ftp: loaded support on port[0] = 21 [ 541.503951] chnl_net:caif_netlink_parms(): no params data found [ 541.548710] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.555214] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.562461] device bridge_slave_0 entered promiscuous mode [ 541.577259] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.583772] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.591211] device bridge_slave_1 entered promiscuous mode [ 541.607646] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 541.616872] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 541.641339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 541.648382] team0: Port device team_slave_0 added [ 541.654080] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 541.661408] team0: Port device team_slave_1 added [ 541.666728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 541.676606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 541.744037] device hsr_slave_0 entered promiscuous mode [ 541.780477] device hsr_slave_1 entered promiscuous mode [ 541.824951] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 541.831974] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 541.847383] bridge0: port 2(bridge_slave_1) entered blocking state [ 541.853756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 541.860420] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.866785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 541.899632] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 541.906159] 8021q: adding VLAN 0 to HW filter on device bond0 [ 541.914674] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 541.927582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 541.934620] bridge0: port 1(bridge_slave_0) entered disabled state [ 541.941650] bridge0: port 2(bridge_slave_1) entered disabled state [ 541.952155] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 541.958225] 8021q: adding VLAN 0 to HW filter on device team0 [ 541.970597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 541.978195] bridge0: port 1(bridge_slave_0) entered blocking state [ 541.984586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.001143] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 542.008704] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.015125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.023306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 542.031240] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 542.045076] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 542.059370] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 542.070380] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 542.081898] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 542.088302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 542.096402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 542.108376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 542.121951] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 542.133187] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 542.230383] device bridge_slave_1 left promiscuous mode [ 542.235864] bridge0: port 2(bridge_slave_1) entered disabled state 23:43:17 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) prctl$PR_SET_FPEXC(0xc, 0x0) r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xc56, 0x200000) prctl$PR_SVE_SET_VL(0x32, 0x10026) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000002c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x40) dup2(0xffffffffffffffff, r0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000440)) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x117, 0x2}}, 0x20) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, 0x0, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x1c, &(0x7f0000000280)=[@in6={0xa, 0x4e24, 0x9, @mcast2}]}, &(0x7f0000000380)=0x10) 23:43:17 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001240)='/dev/sequencer\x00', 0x0, 0x0) close(r0) 23:43:17 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[]) 23:43:17 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0x0, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 542.307248] device bridge_slave_0 left promiscuous mode [ 542.329827] bridge0: port 1(bridge_slave_0) entered disabled state 23:43:17 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[]) [ 542.368054] overlayfs: missing 'lowerdir' 23:43:18 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040), 0x4) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 542.502528] overlayfs: missing 'lowerdir' 23:43:18 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) [ 542.530654] protocol 88fb is buggy, dev hsr_slave_0 [ 542.536100] protocol 88fb is buggy, dev hsr_slave_1 [ 542.642262] overlayfs: missing 'lowerdir' 23:43:18 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) [ 542.703186] device hsr_slave_1 left promiscuous mode 23:43:18 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0x0, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:18 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB]) [ 542.767088] overlayfs: missing 'lowerdir' [ 542.781431] device hsr_slave_0 left promiscuous mode [ 542.844633] overlayfs: missing 'lowerdir' [ 542.865272] team0 (unregistering): Port device team_slave_1 removed [ 542.944032] team0 (unregistering): Port device team_slave_0 removed [ 543.030736] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 543.130490] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 543.318635] bond0 (unregistering): Released all slaves 23:43:19 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 543.426891] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 545.251410] IPVS: ftp: loaded support on port[0] = 21 [ 546.056419] chnl_net:caif_netlink_parms(): no params data found [ 546.105327] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.116343] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.123582] device bridge_slave_0 entered promiscuous mode [ 546.130580] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.136989] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.149344] device bridge_slave_1 entered promiscuous mode [ 546.166135] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 546.175622] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 546.193710] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 546.201040] team0: Port device team_slave_0 added [ 546.206378] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 546.213704] team0: Port device team_slave_1 added [ 546.218889] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 546.231816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 546.285639] device hsr_slave_0 entered promiscuous mode [ 546.330327] device hsr_slave_1 entered promiscuous mode [ 546.370582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 546.377509] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 546.397755] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.404144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.410783] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.417114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.449471] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 546.455799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 546.469718] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 546.477995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 546.485413] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.492168] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.502078] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 546.508147] 8021q: adding VLAN 0 to HW filter on device team0 [ 546.519289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 546.527389] bridge0: port 1(bridge_slave_0) entered blocking state [ 546.533779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 546.551099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 546.558639] bridge0: port 2(bridge_slave_1) entered blocking state [ 546.565022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 546.574329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 546.581969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 546.596095] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 546.604989] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 546.614726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 546.623773] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 546.629766] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 546.647044] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 546.656961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 547.002079] bridge0: port 3(gretap0) entered disabled state [ 547.009113] device gretap0 left promiscuous mode [ 547.013999] bridge0: port 3(gretap0) entered disabled state [ 547.045215] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:43:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:22 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=']) 23:43:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:22 executing program 4: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:22 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x0, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:22 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 547.292164] overlayfs: unrecognized mount option "lowerdir=" or missing value 23:43:22 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=']) [ 547.340744] device bridge_slave_1 left promiscuous mode [ 547.346278] bridge0: port 2(bridge_slave_1) entered disabled state 23:43:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:23 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) [ 547.423644] device bridge_slave_0 left promiscuous mode [ 547.448784] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.472562] overlayfs: unrecognized mount option "lowerdir=" or missing value 23:43:23 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=']) [ 547.598874] device bridge_slave_1 left promiscuous mode [ 547.600123] protocol 88fb is buggy, dev hsr_slave_0 [ 547.604695] protocol 88fb is buggy, dev hsr_slave_0 [ 547.609398] protocol 88fb is buggy, dev hsr_slave_1 [ 547.614411] protocol 88fb is buggy, dev hsr_slave_1 23:43:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:23 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(0x0) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:23 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:23 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:fi']) [ 547.693786] overlayfs: unrecognized mount option "lowerdir=" or missing value [ 547.723337] bridge0: port 2(bridge_slave_1) entered disabled state 23:43:23 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x0, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 547.828630] overlayfs: failed to resolve 'fi': -2 23:43:23 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:fi']) [ 547.861440] device bridge_slave_0 left promiscuous mode [ 547.872635] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.912819] overlayfs: failed to resolve 'fi': -2 [ 548.160474] protocol 88fb is buggy, dev hsr_slave_0 [ 548.166442] protocol 88fb is buggy, dev hsr_slave_1 [ 548.180228] device hsr_slave_1 left promiscuous mode [ 548.223971] device hsr_slave_0 left promiscuous mode [ 548.265469] team0 (unregistering): Port device team_slave_1 removed [ 548.297065] team0 (unregistering): Port device team_slave_0 removed [ 548.325738] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 548.404331] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 548.526106] bond0 (unregistering): Released all slaves [ 548.612778] device hsr_slave_1 left promiscuous mode [ 548.654404] device hsr_slave_0 left promiscuous mode [ 548.694444] team0 (unregistering): Port device team_slave_1 removed [ 548.704091] team0 (unregistering): Port device team_slave_0 removed [ 548.715527] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 548.776362] bond0 (unregistering): Released all slaves [ 551.351387] IPVS: ftp: loaded support on port[0] = 21 [ 552.152958] chnl_net:caif_netlink_parms(): no params data found [ 552.195462] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.201963] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.209053] device bridge_slave_0 entered promiscuous mode [ 552.215723] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.222394] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.229213] device bridge_slave_1 entered promiscuous mode [ 552.253921] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 552.264677] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 552.281576] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 552.288647] team0: Port device team_slave_0 added [ 552.294264] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 552.301591] team0: Port device team_slave_1 added [ 552.309212] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 552.316421] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 552.372280] device hsr_slave_0 entered promiscuous mode [ 552.410278] device hsr_slave_1 entered promiscuous mode [ 552.455046] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 552.462084] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 552.476669] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.483025] bridge0: port 2(bridge_slave_1) entered forwarding state [ 552.489633] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.496021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 552.528766] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 552.535247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 552.543759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 552.553315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 552.562263] bridge0: port 1(bridge_slave_0) entered disabled state [ 552.568840] bridge0: port 2(bridge_slave_1) entered disabled state [ 552.578772] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 552.584954] 8021q: adding VLAN 0 to HW filter on device team0 [ 552.595631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 552.603940] bridge0: port 1(bridge_slave_0) entered blocking state [ 552.610320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 552.619391] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 552.627208] bridge0: port 2(bridge_slave_1) entered blocking state [ 552.633593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 552.653324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 552.661207] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 552.671022] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 552.683960] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 552.694532] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 552.704812] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 552.711462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 552.718894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 552.726534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 552.743124] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 552.754779] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 552.900447] device bridge_slave_1 left promiscuous mode [ 552.905931] bridge0: port 2(bridge_slave_1) entered disabled state 23:43:28 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:28 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:28 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x0, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:28 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:fi']) 23:43:28 executing program 2: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(0x0) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 552.966349] device bridge_slave_0 left promiscuous mode [ 552.972362] bridge0: port 1(bridge_slave_0) entered disabled state 23:43:28 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file']) [ 553.061853] overlayfs: failed to resolve 'fi': -2 [ 553.148941] overlayfs: failed to resolve 'file': -2 23:43:28 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file']) 23:43:28 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:28 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file']) [ 553.282517] device hsr_slave_1 left promiscuous mode [ 553.288221] overlayfs: failed to resolve 'file': -2 23:43:28 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x0, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:28 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0']) [ 553.345845] device hsr_slave_0 left promiscuous mode [ 553.360438] overlayfs: failed to resolve 'file': -2 [ 553.424320] team0 (unregistering): Port device team_slave_1 removed [ 553.453865] team0 (unregistering): Port device team_slave_0 removed [ 553.477119] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 553.525602] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 553.686874] bond0 (unregistering): Released all slaves [ 553.779303] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:43:29 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:29 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:29 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0']) 23:43:29 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x0, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 555.961479] IPVS: ftp: loaded support on port[0] = 21 [ 556.953638] chnl_net:caif_netlink_parms(): no params data found [ 556.998192] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.005955] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.016644] device bridge_slave_0 entered promiscuous mode [ 557.024428] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.034117] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.041960] device bridge_slave_1 entered promiscuous mode [ 557.062084] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 557.071322] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 557.088020] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 557.095409] team0: Port device team_slave_0 added [ 557.105889] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 557.113256] team0: Port device team_slave_1 added [ 557.118406] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 557.125952] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 557.183910] device hsr_slave_0 entered promiscuous mode [ 557.201140] device hsr_slave_1 entered promiscuous mode [ 557.260610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 557.267525] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 557.284747] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.291125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.297690] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.304080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.336187] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 557.342311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 557.350152] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 557.358245] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 557.366838] bridge0: port 1(bridge_slave_0) entered disabled state [ 557.373511] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.387814] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 557.393954] 8021q: adding VLAN 0 to HW filter on device team0 [ 557.403240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 557.410822] bridge0: port 1(bridge_slave_0) entered blocking state [ 557.417141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 557.426361] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 557.434127] bridge0: port 2(bridge_slave_1) entered blocking state [ 557.440508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 557.459771] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 557.467879] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 557.477398] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 557.489005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 557.502602] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 557.511896] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 557.517895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 557.534905] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 557.544546] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 557.941430] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 558.080440] device bridge_slave_1 left promiscuous mode [ 558.086011] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.141273] device bridge_slave_0 left promiscuous mode [ 558.146790] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.204853] device bridge_slave_1 left promiscuous mode [ 558.211611] bridge0: port 2(bridge_slave_1) entered disabled state [ 558.258053] device bridge_slave_0 left promiscuous mode [ 558.264765] bridge0: port 1(bridge_slave_0) entered disabled state [ 558.431920] device hsr_slave_1 left promiscuous mode [ 558.524394] device hsr_slave_0 left promiscuous mode [ 558.563232] team0 (unregistering): Port device team_slave_1 removed [ 558.575265] team0 (unregistering): Port device team_slave_0 removed [ 558.584337] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 558.643996] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 558.725981] bond0 (unregistering): Released all slaves [ 558.821754] device hsr_slave_1 left promiscuous mode [ 558.863307] device hsr_slave_0 left promiscuous mode [ 558.903107] team0 (unregistering): Port device team_slave_1 removed [ 558.912998] team0 (unregistering): Port device team_slave_0 removed [ 558.932211] bond0 (unregistering): Releasing backup interface bond_slave_1 23:43:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/195, 0xc3}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xfffffec8, 0x0, 0x0, 0x800e00539) shutdown(r1, 0x0) shutdown(r2, 0x0) [ 558.972405] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 559.045802] bond0 (unregistering): Released all slaves [ 561.611392] IPVS: ftp: loaded support on port[0] = 21 [ 562.534113] IPVS: ftp: loaded support on port[0] = 21 [ 562.608687] chnl_net:caif_netlink_parms(): no params data found [ 562.663663] bridge0: port 1(bridge_slave_0) entered blocking state [ 562.670262] bridge0: port 1(bridge_slave_0) entered disabled state [ 562.677087] device bridge_slave_0 entered promiscuous mode [ 562.684206] bridge0: port 2(bridge_slave_1) entered blocking state [ 562.690629] bridge0: port 2(bridge_slave_1) entered disabled state [ 562.697720] device bridge_slave_1 entered promiscuous mode [ 562.727708] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 562.739431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 562.788602] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 562.795899] team0: Port device team_slave_0 added [ 562.804553] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 562.811835] team0: Port device team_slave_1 added [ 562.820126] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 562.827202] chnl_net:caif_netlink_parms(): no params data found [ 562.835553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 562.903946] device hsr_slave_0 entered promiscuous mode [ 562.970368] device hsr_slave_1 entered promiscuous mode [ 563.021125] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 563.028223] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 563.057904] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.064720] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.071804] device bridge_slave_0 entered promiscuous mode [ 563.079680] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.086311] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.093732] device bridge_slave_1 entered promiscuous mode [ 563.117341] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 563.128724] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 563.151318] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.157715] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.164417] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.170832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.178623] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 563.185952] team0: Port device team_slave_0 added [ 563.192498] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 563.199729] team0: Port device team_slave_1 added [ 563.207155] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 563.214738] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 563.272791] device hsr_slave_0 entered promiscuous mode [ 563.310615] device hsr_slave_1 entered promiscuous mode [ 563.375744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 563.382850] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 563.403126] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.409470] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.416154] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.422524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.461480] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 563.467563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 563.477892] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 563.488804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 563.496898] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.505551] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.514210] bridge0: port 1(bridge_slave_0) entered disabled state [ 563.521727] bridge0: port 2(bridge_slave_1) entered disabled state [ 563.532004] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 563.538097] 8021q: adding VLAN 0 to HW filter on device team0 [ 563.547956] 8021q: adding VLAN 0 to HW filter on device bond0 [ 563.557882] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 563.568978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 563.576462] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 563.584308] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.591004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.599667] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 563.612569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 563.621287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 563.629095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 563.637033] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.643452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.653315] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 563.661665] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 563.667839] 8021q: adding VLAN 0 to HW filter on device team0 [ 563.677963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 563.686081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 563.694271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 563.702358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 563.709924] bridge0: port 1(bridge_slave_0) entered blocking state [ 563.717398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 563.727130] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 563.736459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 563.746846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 563.754813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 563.762746] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 563.770911] bridge0: port 2(bridge_slave_1) entered blocking state [ 563.777259] bridge0: port 2(bridge_slave_1) entered forwarding state [ 563.786783] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 563.796885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 563.804660] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 563.812776] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 563.820593] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 563.828496] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 563.838448] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 563.846159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 563.856571] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 563.864759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 563.875850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 563.885222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 563.896933] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 563.904083] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 563.912012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 563.919483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 563.928280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 563.936101] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 563.946826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 563.955181] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 563.964414] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 563.974659] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 563.980752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 563.987608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 563.995276] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 564.003143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 564.010672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 564.021154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 564.029972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 564.037773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 564.048686] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 564.056898] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 564.066897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 564.077338] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 564.084240] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 564.091488] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 564.098987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 564.109529] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 564.129524] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 564.142026] 8021q: adding VLAN 0 to HW filter on device batadv0 23:43:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:40 executing program 1: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='lowerdir=.:file0']) 23:43:40 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:40 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/195, 0xc3}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x10, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xfffffec8, 0x0, 0x0, 0x800e00539) shutdown(r1, 0x0) shutdown(r2, 0x0) 23:43:40 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x0, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000000c0)=""/50, 0x32}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r3, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r5, &(0x7f0000001780)=[{&(0x7f0000000040)=""/114, 0x72}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r4, 0x0) shutdown(r1, 0x0) 23:43:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/195, 0xc3}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) recvfrom$inet(r2, 0x0, 0xfffffec8, 0x0, 0x0, 0x800e00539) shutdown(r1, 0x0) shutdown(r2, 0x0) 23:43:41 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000840)=""/195, 0xc3}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x9, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xfffffec8, 0x0, 0x0, 0x800e00539) shutdown(r1, 0x0) shutdown(r2, 0x0) 23:43:41 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:41 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x0, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod(&(0x7f00000005c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v2, 0x14, 0x0) chown(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) 23:43:41 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x0, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 566.242192] protocol 88fb is buggy, dev hsr_slave_0 [ 566.247283] protocol 88fb is buggy, dev hsr_slave_1 [ 566.320963] protocol 88fb is buggy, dev hsr_slave_0 [ 566.326896] protocol 88fb is buggy, dev hsr_slave_1 [ 566.490247] protocol 88fb is buggy, dev hsr_slave_0 [ 566.495363] protocol 88fb is buggy, dev hsr_slave_1 [ 566.640118] protocol 88fb is buggy, dev hsr_slave_0 [ 566.645235] protocol 88fb is buggy, dev hsr_slave_1 [ 567.780947] IPVS: ftp: loaded support on port[0] = 21 [ 568.761499] chnl_net:caif_netlink_parms(): no params data found [ 568.798235] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.805453] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.812792] device bridge_slave_0 entered promiscuous mode [ 568.819357] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.825850] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.832716] device bridge_slave_1 entered promiscuous mode [ 568.852370] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 568.861546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 568.878338] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 568.885669] team0: Port device team_slave_0 added [ 568.891323] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 568.898345] team0: Port device team_slave_1 added [ 568.903699] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 568.910913] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 568.966128] device hsr_slave_0 entered promiscuous mode [ 569.020483] device hsr_slave_1 entered promiscuous mode [ 569.070489] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 569.077319] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 569.090289] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.096650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.103297] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.109641] bridge0: port 1(bridge_slave_0) entered forwarding state [ 569.140793] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 569.146864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 569.155093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 569.163631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 569.171771] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.178527] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.187945] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 569.194129] 8021q: adding VLAN 0 to HW filter on device team0 [ 569.202604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 569.211114] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.217452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 569.240640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 569.248218] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.254613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.262406] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 569.269897] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 569.277564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 569.285316] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 569.293667] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 569.301913] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 569.307925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 569.322549] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 569.335032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 569.750561] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 23:43:46 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:43:46 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x0, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:43:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:46 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:46 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:43:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x0, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:46 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:46 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:46 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) [ 571.520112] protocol 88fb is buggy, dev hsr_slave_0 [ 571.525230] protocol 88fb is buggy, dev hsr_slave_1 [ 571.560527] device bridge_slave_1 left promiscuous mode [ 571.566042] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.641057] device bridge_slave_0 left promiscuous mode [ 571.646600] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.842420] device hsr_slave_1 left promiscuous mode [ 571.894345] device hsr_slave_0 left promiscuous mode [ 571.934277] team0 (unregistering): Port device team_slave_1 removed [ 571.954601] team0 (unregistering): Port device team_slave_0 removed [ 571.987649] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 572.044327] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 572.145548] bond0 (unregistering): Released all slaves [ 574.060903] IPVS: ftp: loaded support on port[0] = 21 [ 574.816634] IPVS: ftp: loaded support on port[0] = 21 [ 574.899032] chnl_net:caif_netlink_parms(): no params data found [ 574.958740] bridge0: port 1(bridge_slave_0) entered blocking state [ 574.965293] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.973049] device bridge_slave_0 entered promiscuous mode [ 574.979959] bridge0: port 2(bridge_slave_1) entered blocking state [ 574.986509] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.993800] device bridge_slave_1 entered promiscuous mode [ 575.018908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 575.035210] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 575.075982] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 575.083294] team0: Port device team_slave_0 added [ 575.103419] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 575.110760] team0: Port device team_slave_1 added [ 575.116123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 575.126563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 575.195520] device hsr_slave_0 entered promiscuous mode [ 575.230633] device hsr_slave_1 entered promiscuous mode [ 575.270432] chnl_net:caif_netlink_parms(): no params data found [ 575.280380] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 575.291830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 575.327051] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.333429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.340145] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.346490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.365740] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.373431] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.380644] device bridge_slave_0 entered promiscuous mode [ 575.387857] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.394437] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.401926] device bridge_slave_1 entered promiscuous mode [ 575.424694] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 575.434108] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 575.458231] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 575.465923] team0: Port device team_slave_0 added [ 575.471719] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 575.478766] team0: Port device team_slave_1 added [ 575.484496] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 575.492577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 575.564184] device hsr_slave_0 entered promiscuous mode [ 575.603996] device hsr_slave_1 entered promiscuous mode [ 575.660794] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 575.674267] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 575.697677] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.704035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.710679] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.717035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.732674] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 575.738767] 8021q: adding VLAN 0 to HW filter on device bond0 [ 575.748021] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 575.759522] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 575.767031] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.774493] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.782044] bridge0: port 1(bridge_slave_0) entered disabled state [ 575.788615] bridge0: port 2(bridge_slave_1) entered disabled state [ 575.799122] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 575.805234] 8021q: adding VLAN 0 to HW filter on device team0 [ 575.819510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.827576] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.833969] bridge0: port 1(bridge_slave_0) entered forwarding state [ 575.842116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 575.849656] bridge0: port 2(bridge_slave_1) entered blocking state [ 575.856048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 575.873373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 575.883270] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 575.894488] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 575.901820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 575.911616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 575.920526] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 575.928401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 575.936234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 575.943773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 575.951535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 575.966289] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 575.972432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 575.988347] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 576.007299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 576.017110] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 576.025343] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 576.034914] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 576.041549] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 576.048490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 576.058657] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 576.071162] 8021q: adding VLAN 0 to HW filter on device team0 [ 576.081305] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 576.088328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 576.096514] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 576.105043] bridge0: port 1(bridge_slave_0) entered blocking state [ 576.111460] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.121183] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 576.129979] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 576.139537] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 576.147866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 576.155539] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.161948] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.169363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 576.179795] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 576.188418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 576.199462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 576.213550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 576.223335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 576.232515] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 576.240662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 576.248485] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 576.260547] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 576.269754] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 576.277265] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 576.285158] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 576.293057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 576.302046] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 576.316378] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 23:43:51 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:43:51 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x0, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:51 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 576.329963] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 576.343813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 576.388848] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 576.419256] 8021q: adding VLAN 0 to HW filter on device batadv0 23:43:52 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') 23:43:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 576.590161] protocol 88fb is buggy, dev hsr_slave_0 [ 576.595254] protocol 88fb is buggy, dev hsr_slave_1 23:43:52 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:52 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) 23:43:52 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x0, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:43:52 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 577.330799] device bridge_slave_1 left promiscuous mode [ 577.336441] bridge0: port 2(bridge_slave_1) entered disabled state [ 577.441876] device bridge_slave_0 left promiscuous mode [ 577.448877] bridge0: port 1(bridge_slave_0) entered disabled state 23:43:53 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:53 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x0, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 577.680305] protocol 88fb is buggy, dev hsr_slave_0 [ 577.685390] protocol 88fb is buggy, dev hsr_slave_1 23:43:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 577.760903] protocol 88fb is buggy, dev hsr_slave_0 [ 577.766016] protocol 88fb is buggy, dev hsr_slave_1 [ 577.835683] device hsr_slave_1 left promiscuous mode 23:43:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 577.894742] device hsr_slave_0 left promiscuous mode [ 577.965989] team0 (unregistering): Port device team_slave_1 removed [ 578.053535] team0 (unregistering): Port device team_slave_0 removed 23:43:53 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x0, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 578.106482] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 578.174722] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 578.337204] bond0 (unregistering): Released all slaves [ 578.720124] protocol 88fb is buggy, dev hsr_slave_0 [ 578.725215] protocol 88fb is buggy, dev hsr_slave_1 [ 578.800166] protocol 88fb is buggy, dev hsr_slave_0 [ 578.805252] protocol 88fb is buggy, dev hsr_slave_1 [ 580.660857] IPVS: ftp: loaded support on port[0] = 21 [ 581.521762] IPVS: ftp: loaded support on port[0] = 21 [ 581.572048] chnl_net:caif_netlink_parms(): no params data found [ 581.649505] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.656223] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.663592] device bridge_slave_0 entered promiscuous mode [ 581.673548] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.679955] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.686830] device bridge_slave_1 entered promiscuous mode [ 581.765292] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 581.799784] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 581.822613] chnl_net:caif_netlink_parms(): no params data found [ 581.858017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 581.865116] team0: Port device team_slave_0 added [ 581.870795] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 581.877994] team0: Port device team_slave_1 added [ 581.883548] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 581.891016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 581.972476] device hsr_slave_0 entered promiscuous mode [ 582.030389] device hsr_slave_1 entered promiscuous mode [ 582.078127] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 582.099854] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 582.107724] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.114263] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.121916] device bridge_slave_0 entered promiscuous mode [ 582.128555] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.135360] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.142551] device bridge_slave_1 entered promiscuous mode [ 582.168233] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 582.182684] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 582.204155] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.210527] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.217086] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.223471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.248082] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 582.255972] team0: Port device team_slave_0 added [ 582.268481] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 582.275759] team0: Port device team_slave_1 added [ 582.281535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 582.288986] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 582.322367] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 582.328455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 582.352257] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 582.393657] device hsr_slave_0 entered promiscuous mode [ 582.440505] device hsr_slave_1 entered promiscuous mode [ 582.494259] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 582.502615] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 582.511592] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 582.518667] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.525700] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.542614] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 582.548675] 8021q: adding VLAN 0 to HW filter on device team0 [ 582.562966] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 582.569695] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 582.577115] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 582.585182] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.591574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 582.601754] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 582.610960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 582.618671] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 582.626607] bridge0: port 2(bridge_slave_1) entered blocking state [ 582.632981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 582.647287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 582.655311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 582.669854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 582.677832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 582.692278] device bridge_slave_1 left promiscuous mode [ 582.697785] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.730616] device bridge_slave_0 left promiscuous mode [ 582.736052] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.826920] device hsr_slave_1 left promiscuous mode [ 582.872549] device hsr_slave_0 left promiscuous mode [ 582.913288] team0 (unregistering): Port device team_slave_1 removed [ 582.924649] team0 (unregistering): Port device team_slave_0 removed [ 582.934091] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 582.973549] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 583.045680] bond0 (unregistering): Released all slaves [ 583.094807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 583.102437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 583.110380] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 583.118124] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 583.129075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 583.137937] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 583.145480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 583.157110] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 583.165981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 583.173716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 583.181601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 583.188973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 583.199001] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 583.206109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 583.214035] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 583.223838] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 583.229834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 583.238086] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 583.249682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 583.256941] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 583.268788] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 583.274944] 8021q: adding VLAN 0 to HW filter on device team0 [ 583.284269] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 583.293462] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 583.301981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 583.309483] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.315852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 583.362024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 583.371032] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 583.377275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 583.390392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 583.398099] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 583.406493] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.412896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 583.425429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 583.433517] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 583.441637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 583.452992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 583.461188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 583.475106] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 583.487751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 583.505208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 583.522402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 583.540523] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 583.547493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 583.569118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 583.578945] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 583.589055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 583.597337] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 583.607878] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 583.617346] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 583.628762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 583.656353] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 583.663925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 583.684252] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 583.708440] 8021q: adding VLAN 0 to HW filter on device batadv0 23:43:59 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:43:59 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x0, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 584.000235] net_ratelimit: 4 callbacks suppressed [ 584.000241] protocol 88fb is buggy, dev hsr_slave_0 [ 584.000254] protocol 88fb is buggy, dev hsr_slave_0 [ 584.005145] protocol 88fb is buggy, dev hsr_slave_1 [ 584.010215] protocol 88fb is buggy, dev hsr_slave_1 23:44:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:00 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:00 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:00 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x0, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:00 executing program 0: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:44:01 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x0, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 585.681476] protocol 88fb is buggy, dev hsr_slave_0 [ 585.686957] protocol 88fb is buggy, dev hsr_slave_1 23:44:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(0x0, 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:01 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 585.940509] device bridge_slave_1 left promiscuous mode [ 585.946149] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.065606] device bridge_slave_0 left promiscuous mode [ 586.071740] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.080651] protocol 88fb is buggy, dev hsr_slave_0 [ 586.086119] protocol 88fb is buggy, dev hsr_slave_1 [ 586.160148] protocol 88fb is buggy, dev hsr_slave_0 [ 586.165270] protocol 88fb is buggy, dev hsr_slave_1 [ 586.384853] device hsr_slave_1 left promiscuous mode [ 586.427518] device hsr_slave_0 left promiscuous mode [ 586.468709] team0 (unregistering): Port device team_slave_1 removed [ 586.494568] team0 (unregistering): Port device team_slave_0 removed [ 586.514226] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 586.564898] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 586.683599] bond0 (unregistering): Released all slaves [ 588.620860] IPVS: ftp: loaded support on port[0] = 21 [ 589.442504] IPVS: ftp: loaded support on port[0] = 21 [ 589.474576] chnl_net:caif_netlink_parms(): no params data found [ 589.542289] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.548718] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.555799] device bridge_slave_0 entered promiscuous mode [ 589.566102] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.572582] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.579462] device bridge_slave_1 entered promiscuous mode [ 589.608481] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 589.617910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 589.642070] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 589.649172] team0: Port device team_slave_0 added [ 589.655552] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 589.662819] team0: Port device team_slave_1 added [ 589.679584] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 589.687024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 589.782800] device hsr_slave_0 entered promiscuous mode [ 589.820353] device hsr_slave_1 entered promiscuous mode [ 589.884342] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 589.891509] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 589.902851] chnl_net:caif_netlink_parms(): no params data found [ 589.956853] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.964380] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.971439] device bridge_slave_0 entered promiscuous mode [ 589.978332] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.985223] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.992518] device bridge_slave_1 entered promiscuous mode [ 589.999289] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.005653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.012374] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.018723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.048284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 590.058387] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 590.086149] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 590.093960] team0: Port device team_slave_0 added [ 590.099853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 590.107234] team0: Port device team_slave_1 added [ 590.112642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 590.122633] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 590.194129] device hsr_slave_0 entered promiscuous mode [ 590.230401] device hsr_slave_1 entered promiscuous mode [ 590.271027] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 590.278740] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 590.296023] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.302403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.309018] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.315411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.359654] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 590.366473] 8021q: adding VLAN 0 to HW filter on device bond0 [ 590.376667] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 590.388682] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 590.395117] 8021q: adding VLAN 0 to HW filter on device team0 [ 590.404528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 590.412298] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.418882] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.426678] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.433369] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.450179] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 590.457587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 590.465331] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.471701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.478757] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 590.486763] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.493161] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.503221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 590.511193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 590.520695] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 590.527339] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 590.537666] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 590.549053] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 590.555996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 590.568360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 590.575213] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 590.582985] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 590.593603] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 590.599680] 8021q: adding VLAN 0 to HW filter on device team0 [ 590.606060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 590.615197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 590.625211] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 590.633961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 590.641808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 590.649294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 590.656863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 590.665961] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 590.677126] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 590.683997] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 590.692659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 590.700373] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.706708] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.714308] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 590.723157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 590.733113] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 590.743007] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 590.749028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 590.757136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 590.768489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 590.776942] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.783317] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.793668] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 590.802064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 590.814958] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 590.825011] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 590.832505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 590.845138] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 590.854698] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 590.862126] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 590.869917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 590.878012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 590.888552] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 590.896731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 590.905005] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 590.915351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 590.922990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 590.931034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 590.942139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 590.952300] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 590.960325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 590.969212] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 590.975593] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 590.991277] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 591.002875] 8021q: adding VLAN 0 to HW filter on device batadv0 23:44:06 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 1: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:07 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x0, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) 23:44:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(0xffffffffffffffff, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) 23:44:07 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 592.320403] protocol 88fb is buggy, dev hsr_slave_0 [ 592.325542] protocol 88fb is buggy, dev hsr_slave_1 23:44:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 592.400995] protocol 88fb is buggy, dev hsr_slave_0 [ 592.407215] protocol 88fb is buggy, dev hsr_slave_1 23:44:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x0, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000700)='/dev/btrfs-control\x00', 0x10000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000740)=0x3, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x0, 0x2, 0x0, "665bf726c3b481c9479eb6434e79fc5347a761cb8f2e3d1a7d3ef5f158fc0bd81f996a804e65c2dd9d6f801839f10b9f75f87c5673801abf45add2c355d0005772b6a527284786cd7aeeb151bf7629d8"}, 0xd8) 23:44:08 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:08 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 593.280488] protocol 88fb is buggy, dev hsr_slave_0 [ 593.285582] protocol 88fb is buggy, dev hsr_slave_1 23:44:08 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 593.360138] protocol 88fb is buggy, dev hsr_slave_0 [ 593.365223] protocol 88fb is buggy, dev hsr_slave_1 23:44:09 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x0, 0x722b, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:09 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x0, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) 23:44:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 594.170550] device bridge_slave_1 left promiscuous mode [ 594.176255] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.262725] device bridge_slave_0 left promiscuous mode [ 594.268303] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.462637] device hsr_slave_1 left promiscuous mode [ 594.514536] device hsr_slave_0 left promiscuous mode [ 594.575048] team0 (unregistering): Port device team_slave_1 removed [ 594.597813] team0 (unregistering): Port device team_slave_0 removed [ 594.612829] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 594.655057] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 594.768204] bond0 (unregistering): Released all slaves [ 596.680971] IPVS: ftp: loaded support on port[0] = 21 [ 597.522232] IPVS: ftp: loaded support on port[0] = 21 [ 597.588605] chnl_net:caif_netlink_parms(): no params data found [ 597.668803] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.675378] bridge0: port 1(bridge_slave_0) entered disabled state [ 597.682706] device bridge_slave_0 entered promiscuous mode [ 597.701409] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.707767] bridge0: port 2(bridge_slave_1) entered disabled state [ 597.714708] device bridge_slave_1 entered promiscuous mode [ 597.769405] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 597.798036] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 597.832977] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 597.840210] team0: Port device team_slave_0 added [ 597.845337] chnl_net:caif_netlink_parms(): no params data found [ 597.855596] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 597.862719] team0: Port device team_slave_1 added [ 597.876223] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 597.891743] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 597.952603] device hsr_slave_0 entered promiscuous mode [ 597.990366] device hsr_slave_1 entered promiscuous mode [ 598.038224] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 598.045344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 598.069401] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.075900] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.087939] device bridge_slave_0 entered promiscuous mode [ 598.095330] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.101705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 598.108284] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.114720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 598.130408] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.136866] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.144481] device bridge_slave_1 entered promiscuous mode [ 598.171399] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 598.189246] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 598.219218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 598.226637] team0: Port device team_slave_0 added [ 598.239127] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 598.247289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 598.255721] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 598.263332] team0: Port device team_slave_1 added [ 598.269060] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 598.281851] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 598.288231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 598.366812] device hsr_slave_0 entered promiscuous mode [ 598.410345] device hsr_slave_1 entered promiscuous mode [ 598.472466] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 598.478553] 8021q: adding VLAN 0 to HW filter on device team0 [ 598.484852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 598.492162] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.498747] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.509006] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 598.535986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 598.547936] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 598.555536] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.561931] bridge0: port 1(bridge_slave_0) entered forwarding state [ 598.569248] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 598.578074] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.584456] bridge0: port 2(bridge_slave_1) entered forwarding state [ 598.591935] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 598.599466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 598.607100] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 598.615094] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 598.622278] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 598.634774] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 598.644925] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 598.654301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 598.666922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 598.674511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 598.689354] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 598.704756] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 598.744572] 8021q: adding VLAN 0 to HW filter on device bond0 [ 598.754839] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 598.763492] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 598.769737] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 598.777175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 598.786883] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 598.793119] 8021q: adding VLAN 0 to HW filter on device team0 [ 598.804783] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 598.811978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 598.819686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 598.827523] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.833904] bridge0: port 1(bridge_slave_0) entered forwarding state [ 598.841996] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 598.851618] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 598.858856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 598.866772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 598.884440] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.890868] bridge0: port 2(bridge_slave_1) entered forwarding state [ 598.901798] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 598.910920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 598.917937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 598.926108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 598.947616] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 598.964574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 598.973915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 598.985590] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 598.992953] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 598.999928] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 599.007885] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 599.018475] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 599.025455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 599.033490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 23:44:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ptrace$getregs(0xc, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:14 executing program 3: pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$inet(r0, 0x0, 0x0, 0x80000) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0xfa) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='coredump_filter\x00') r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) r4 = socket$packet(0x11, 0x0, 0x300) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000400)='TRUE', 0x19f, 0x10000000) fcntl$F_GET_FILE_RW_HINT(r4, 0x40d, &(0x7f00000001c0)) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x81000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$sock_int(r4, 0x1, 0x20000000000002c, &(0x7f00000000c0)=0x1, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x4, &(0x7f0000000300)=0x8000006, 0xfffffffffffffcc4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000140)={0x1, 0x3, 0xffffffff, 0x1, 0x7, 0x80000000, 0x102, 0x2, 0x7, 0x0, 0x5, 0x7, 0x800, 0x0, &(0x7f0000000800)=""/4096, 0x9, 0x3, 0x6}) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r3, 0x1) [ 599.052426] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 599.061434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 599.068974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 599.090850] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 599.096885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 599.160785] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 599.227364] 8021q: adding VLAN 0 to HW filter on device batadv0 23:44:16 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r0 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r0, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) quotactl(0x7fffffff, &(0x7f0000000700)='./file0\x00', 0x0, &(0x7f0000000880)="c279c2ea85") ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:16 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) 23:44:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x3, 0x3, 0x1, 0x4, 0x0, 0x3ff}, &(0x7f00000001c0)=0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, 0x0) readlink(0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f00000005c0)='/dev/swradio#\x00', 0x1, 0x2) read$rfkill(r1, &(0x7f0000000040), 0x8) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0xb}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) syz_emit_ethernet(0x100000270, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000000000001280000000000009078ac141400ac1423bb0700"/54], &(0x7f0000000040)) [ 601.420415] device bridge_slave_1 left promiscuous mode [ 601.425890] bridge0: port 2(bridge_slave_1) entered disabled state [ 601.471564] device bridge_slave_0 left promiscuous mode [ 601.477093] bridge0: port 1(bridge_slave_0) entered disabled state [ 601.613252] device hsr_slave_1 left promiscuous mode [ 601.683738] device hsr_slave_0 left promiscuous mode [ 601.743091] team0 (unregistering): Port device team_slave_1 removed [ 601.754226] team0 (unregistering): Port device team_slave_0 removed [ 601.764206] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 601.804444] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 601.875353] bond0 (unregistering): Released all slaves [ 643.810612] device bridge_slave_1 left promiscuous mode [ 643.816329] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.870635] device bridge_slave_0 left promiscuous mode [ 643.876092] bridge0: port 1(bridge_slave_0) entered disabled state [ 643.993230] device hsr_slave_1 left promiscuous mode [ 644.033296] device hsr_slave_0 left promiscuous mode [ 644.073724] team0 (unregistering): Port device team_slave_1 removed [ 644.083893] team0 (unregistering): Port device team_slave_0 removed [ 644.093038] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 644.133657] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 644.203183] bond0 (unregistering): Released all slaves [ 669.270441] device bridge_slave_1 left promiscuous mode [ 669.275978] bridge0: port 2(bridge_slave_1) entered disabled state [ 669.331039] device bridge_slave_0 left promiscuous mode [ 669.336566] bridge0: port 1(bridge_slave_0) entered disabled state [ 669.455366] device hsr_slave_1 left promiscuous mode [ 669.494558] device hsr_slave_0 left promiscuous mode [ 669.542907] team0 (unregistering): Port device team_slave_1 removed [ 669.553172] team0 (unregistering): Port device team_slave_0 removed [ 669.562592] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 669.603609] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 669.676667] bond0 (unregistering): Released all slaves [ 679.530554] device bridge_slave_1 left promiscuous mode [ 679.536025] bridge0: port 2(bridge_slave_1) entered disabled state [ 679.591116] device bridge_slave_0 left promiscuous mode [ 679.596649] bridge0: port 1(bridge_slave_0) entered disabled state [ 679.706079] device hsr_slave_1 left promiscuous mode [ 679.773801] device hsr_slave_0 left promiscuous mode [ 679.812955] team0 (unregistering): Port device team_slave_1 removed [ 679.823364] team0 (unregistering): Port device team_slave_0 removed [ 679.832778] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 679.865882] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 679.955009] bond0 (unregistering): Released all slaves [ 705.150487] device bridge_slave_1 left promiscuous mode [ 705.155965] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.230811] device bridge_slave_0 left promiscuous mode [ 705.236278] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.393028] device hsr_slave_1 left promiscuous mode [ 705.432901] device hsr_slave_0 left promiscuous mode [ 705.473204] team0 (unregistering): Port device team_slave_1 removed [ 705.482665] team0 (unregistering): Port device team_slave_0 removed [ 705.491580] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 705.533125] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 705.608589] bond0 (unregistering): Released all slaves [ 820.711900] bridge0: port 3(gretap0) entered disabled state [ 820.719608] device gretap0 left promiscuous mode [ 820.724890] bridge0: port 3(gretap0) entered disabled state [ 821.050287] IPVS: stopping backup sync thread 8058 ... [ 821.057133] device bridge_slave_1 left promiscuous mode [ 821.063149] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.120994] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.342121] device hsr_slave_1 left promiscuous mode [ 821.385499] device hsr_slave_0 left promiscuous mode [ 821.483287] team0 (unregistering): Port device team_slave_1 removed [ 821.494657] team0 (unregistering): Port device team_slave_0 removed [ 821.506268] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 821.549575] bond0 (unregistering): Released all slaves [ 858.080877] INFO: task syz-executor.0:24881 blocked for more than 140 seconds. [ 858.088410] Not tainted 4.14.137 #33 [ 858.093044] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 858.101058] syz-executor.0 D28528 24881 24539 0x00000004 [ 858.106717] Call Trace: [ 858.109464] __schedule+0x7b8/0x1cd0 [ 858.113220] ? __lock_is_held+0xb6/0x140 [ 858.117283] ? pci_mmcfg_check_reserved+0x150/0x150 [ 858.122369] ? trace_hardirqs_on+0x10/0x10 [ 858.126607] schedule+0x92/0x1c0 [ 858.129967] schedule_timeout+0x93b/0xe10 [ 858.134158] ? wait_for_completion+0x274/0x420 [ 858.138805] ? find_held_lock+0x35/0x130 [ 858.142976] ? usleep_range+0x130/0x130 [ 858.147059] ? _raw_spin_unlock_irq+0x28/0x90 [ 858.151627] ? trace_hardirqs_on_caller+0x400/0x590 [ 858.156648] wait_for_completion+0x27c/0x420 [ 858.161217] ? try_to_wake_up+0xa8/0xf90 [ 858.165283] ? wait_for_completion_interruptible+0x490/0x490 [ 858.171134] ? wake_up_q+0xf0/0xf0 [ 858.174681] kthread_stop+0xda/0x650 [ 858.178376] sdr_cap_stop_streaming+0x1fc/0x320 [ 858.183103] ? sdr_cap_buf_queue+0x230/0x230 [ 858.187520] __vb2_queue_cancel+0xa3/0x890 [ 858.191821] ? lock_downgrade+0x6e0/0x6e0 [ 858.195979] vb2_core_streamoff+0x52/0x110 [ 858.200275] __vb2_cleanup_fileio+0x78/0x150 [ 858.204691] vb2_core_queue_release+0x1d/0x80 [ 858.209223] _vb2_fop_release+0x1cf/0x2a0 [ 858.213515] vb2_fop_release+0x75/0xc0 [ 858.217403] vivid_fop_release+0x180/0x3f0 [ 858.221758] ? vivid_remove+0x3d0/0x3d0 [ 858.225740] ? dev_debug_store+0xe0/0xe0 [ 858.229841] v4l2_release+0xf9/0x190 [ 858.233599] __fput+0x275/0x7a0 [ 858.236880] ____fput+0x16/0x20 [ 858.240304] task_work_run+0x114/0x190 [ 858.244205] exit_to_usermode_loop+0x1da/0x220 [ 858.248812] do_syscall_64+0x4bc/0x640 [ 858.252763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 858.257610] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 858.262860] RIP: 0033:0x413511 [ 858.266054] RSP: 002b:00007ffd3a33f220 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 858.273886] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 0000000000413511 [ 858.281203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 858.288457] RBP: 0000000000000001 R08: ffffffff812a9011 R09: 0000000010745ce9 [ 858.295770] R10: 00007ffd3a33f300 R11: 0000000000000293 R12: 000000000075bf20 [ 858.303080] R13: 0000000000091033 R14: 0000000000761668 R15: ffffffffffffffff [ 858.310416] ? __virt_addr_valid+0x11/0x1f0 [ 858.314761] [ 858.314761] Showing all locks held in the system: [ 858.321167] 1 lock held by khungtaskd/1013: [ 858.325750] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 858.334881] 2 locks held by getty/7047: [ 858.338856] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.347705] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.357075] 2 locks held by getty/7048: [ 858.361100] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.369805] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.379156] 2 locks held by getty/7049: [ 858.383162] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.392063] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.401447] 2 locks held by getty/7050: [ 858.405414] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.414138] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.423491] 2 locks held by getty/7051: [ 858.427453] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.436169] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.445652] 2 locks held by getty/7052: [ 858.449622] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.458345] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.467680] 2 locks held by getty/7053: [ 858.471790] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 858.480527] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 858.489884] [ 858.491574] ============================================= [ 858.491574] [ 858.498589] NMI backtrace for cpu 0 [ 858.502263] CPU: 0 PID: 1013 Comm: khungtaskd Not tainted 4.14.137 #33 [ 858.508927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.518298] Call Trace: [ 858.520876] dump_stack+0x138/0x19c [ 858.524489] nmi_cpu_backtrace.cold+0x57/0x94 [ 858.528977] ? irq_force_complete_move.cold+0x7d/0x7d [ 858.534157] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 858.539425] arch_trigger_cpumask_backtrace+0x14/0x20 [ 858.544604] watchdog+0x5e7/0xb90 [ 858.548043] kthread+0x319/0x430 [ 858.551393] ? hungtask_pm_notify+0x50/0x50 [ 858.555693] ? kthread_create_on_node+0xd0/0xd0 [ 858.560342] ret_from_fork+0x24/0x30 [ 858.564192] Sending NMI from CPU 0 to CPUs 1: [ 858.568761] NMI backtrace for cpu 1 skipped: idling at pc 0xffffffff861bde1e [ 858.569701] Kernel panic - not syncing: hung_task: blocked tasks [ 858.582087] CPU: 0 PID: 1013 Comm: khungtaskd Not tainted 4.14.137 #33 [ 858.588733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 858.598072] Call Trace: [ 858.600646] dump_stack+0x138/0x19c [ 858.604270] panic+0x1f2/0x426 [ 858.607443] ? add_taint.cold+0x16/0x16 [ 858.611396] ? irq_force_complete_move.cold+0x7d/0x7d [ 858.616566] watchdog+0x5f8/0xb90 [ 858.620007] kthread+0x319/0x430 [ 858.623368] ? hungtask_pm_notify+0x50/0x50 [ 858.627669] ? kthread_create_on_node+0xd0/0xd0 [ 858.632409] ret_from_fork+0x24/0x30 [ 858.637261] Kernel Offset: disabled [ 858.640906] Rebooting in 86400 seconds..